Bugzilla – Bug 1222593
VUL-0: CVE-2024-3119: sngrep: buffer overflow due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers
Last modified: 2024-05-29 11:16:03 UTC
A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-3119 https://www.cve.org/CVERecord?id=CVE-2024-3119 qhttps://github.com/irontec/sngrep/releases/tag/v1.8.1 https://pentraze.com/vulnerability-reports/
openSUSE:Factory and Backports are affected.
should be fixed with * SR#1166600 * SR#1166602
Missing in Leap 15.6. Please process incoming submission or fix in Leap 15.6 in your chosen way. (bug 1225537)
As per bug 1225537 now also fixed in Leap 15.6, closing