CVE-2024-3120: Stack-Buffer Overflow in 'Content-Length' and 'Warning' Header Processing in sngrep

9.0 CVSS

Description

A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.

Classification

CVE ID: CVE-2024-3120

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.0

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem Types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Affected Products

Vendor: irontec

Product: sngrep

Exploit Prediction Scoring System (EPSS)

EPSS Score: 1.94% (probability of being exploited)

EPSS Percentile: 81.89% (scored less or equal to compared to others)

EPSS Date: 2025-03-22 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-3120
https://github.com/irontec/sngrep/pull/480/commits/f229a5d31b0be6a6cc3ab4cd9bfa4a1b5c5714c6
https://github.com/irontec/sngrep/releases/tag/v1.8.1
https://pentraze.com/vulnerability-reports/

Timeline