A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.
History

Mon, 03 Feb 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Irontec
Irontec sngrep
Weaknesses CWE-787
CPEs cpe:2.3:a:irontec:sngrep:*:*:*:*:*:*:*:*
Vendors & Products Irontec
Irontec sngrep

cve-icon MITRE

Status: PUBLISHED

Assigner: Pentraze

Published:

Updated: 2024-08-08T21:20:41.031Z

Reserved: 2024-03-31T17:10:09.267Z

Link: CVE-2024-3119

cve-icon Vulnrichment

Updated: 2024-08-01T19:32:42.915Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-10T00:15:12.107

Modified: 2025-02-03T17:43:02.523

Link: CVE-2024-3119

cve-icon Redhat

No data.