PT-2024-23832 · Sngrep +2 · Sngrep +2
Published
2024-04-09
·
Updated
2025-04-11
·
CVE-2024-3119
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
sngrep versions 0.4.2 and later
Description:
A buffer overflow vulnerability exists due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions `sip get callid` and `sip get xcallid` in sip.c use the `strncpy` function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.
Recommendations:
As a temporary workaround, consider disabling the `sip get callid` and `sip get xcallid` functions until a patch is available.
Restrict access to the vulnerable `sip.c` module to minimize the risk of exploitation.
Avoid using the `Call-ID` and `X-Call-ID` SIP headers in affected API endpoints until the issue is resolved.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
RCE
Memory Corruption
Buffer Overflow
Related Identifiers
Affected Products
References · 23
- https://github.com/irontec/sngrep/pull/480/commits/73c15c82d14c69df311e05fa75da734faafd365f⭐ 1061 🔗 190 · Patch
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3120 · Security Note
- https://osv.dev/vulnerability/openSUSE-SU-2024:13856-1 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2024-3119 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2024-3119 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3119 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2024-3119 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2024-3119 · Vendor Advisory
- https://osv.dev/vulnerability/openSUSE-SU-2024:0106-1 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-3119 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2024-3119 · Security Note
- https://errata.altlinux.org/ALT-PU-2025-5216 · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/sngrep · Vendor Advisory
- https://github.com/irontec/sngrep/releases/tag/v1.8.1⭐ 1061 🔗 190 · Note
- https://t.me/cvenotify/76263 · Telegram Post