Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2024:0106-1

Опубликовано: 10 апр. 2024
Источник: suse-cvrf

Описание

Security update for sngrep

This update for sngrep fixes the following issues:

  • Update to version 1.8.1

    • Fix CVE-2024-3119: sngrep: buffer overflow due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers.
    • Fix CVE-2024-3120: sngrep: stack-buffer overflow due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers.
  • Update to versino 1.8.0

    • fix typo in message, thanks to lintian.
    • fix compiler warnings about unused variables.
    • Fixed a typo in comment line in filter.c
    • Redefine usage of POSIX signals.
    • Support for building sngrep using CMake added.
  • Update to version 1.7.0

    • save: add option --text to save captured data to plain text
    • capture: fix memory overflows while parsing IP headers
    • hep: fix hep listener enabled in offline mode
    • core: stop sngrep when parent process has ended
    • ssl: fix decrypt with AES256 GCM SHA384 cipher

Список пакетов

SUSE Package Hub 15 SP5
sngrep-1.8.1-bp155.2.3.1
openSUSE Leap 15.5
sngrep-1.8.1-bp155.2.3.1

Описание

A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.


Затронутые продукты
SUSE Package Hub 15 SP5:sngrep-1.8.1-bp155.2.3.1
openSUSE Leap 15.5:sngrep-1.8.1-bp155.2.3.1

Ссылки

Описание

A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.


Затронутые продукты
SUSE Package Hub 15 SP5:sngrep-1.8.1-bp155.2.3.1
openSUSE Leap 15.5:sngrep-1.8.1-bp155.2.3.1

Ссылки
Уязвимость openSUSE-SU-2024:0106-1