PT-2024-23832 · Sngrep +2 · Sngrep +2

Published

2024-04-09

·

Updated

2025-04-11

·

CVE-2024-3119

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

sngrep versions 0.4.2 and later

Description:

A buffer overflow vulnerability exists due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions `sip get callid` and `sip get xcallid` in sip.c use the `strncpy` function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.

Recommendations:

As a temporary workaround, consider disabling the `sip get callid` and `sip get xcallid` functions until a patch is available.

Restrict access to the vulnerable `sip.c` module to minimize the risk of exploitation.

Avoid using the `Call-ID` and `X-Call-ID` SIP headers in affected API endpoints until the issue is resolved.

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

DoS

RCE

Memory Corruption

Buffer Overflow

Weakness Enumeration

Related Identifiers

ALT-PU-2025-5216
CVE-2024-3119
OPENSUSE-SU-2024:0106-1
OPENSUSE-SU-2024:13856-1

Affected Products

Alt Linux
Debian
Sngrep