Vulnerability Details : CVE-2024-3119
A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2024-3119
- cpe:2.3:a:irontec:sngrep:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-3119
2.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-3119
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
CRITICAL | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
2.2
|
6.0
|
Pentraze | 2024-04-10 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2025-02-03 |
CWE ids for CVE-2024-3119
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: 41c37e40-543d-43a2-b660-2fee83ea851a (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2024-3119
-
https://github.com/irontec/sngrep/releases/tag/v1.8.1
Release v1.8.1 · irontec/sngrep · GitHubRelease Notes
-
https://pentraze.com/vulnerability-reports/
Pentraze CybersecurityThird Party Advisory
-
https://github.com/irontec/sngrep/pull/480/commits/73c15c82d14c69df311e05fa75da734faafd365f
Fixes for Stack Buffer Overflows in SIP Header Processing by htejeda · Pull Request #480 · irontec/sngrep · GitHubPatch
Jump to