Описание
Security update for sngrep
This update for sngrep fixes the following issues:
-
Update to version 1.8.1
- Fix CVE-2024-3119: sngrep: buffer overflow due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers.
- Fix CVE-2024-3120: sngrep: stack-buffer overflow due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers.
-
Update to versino 1.8.0
- fix typo in message, thanks to lintian.
- fix compiler warnings about unused variables.
- Fixed a typo in comment line in filter.c
- Redefine usage of POSIX signals.
- Support for building sngrep using CMake added.
-
Update to version 1.7.0
- save: add option --text to save captured data to plain text
- capture: fix memory overflows while parsing IP headers
- hep: fix hep listener enabled in offline mode
- core: stop sngrep when parent process has ended
- ssl: fix decrypt with AES256 GCM SHA384 cipher
Список пакетов
SUSE Package Hub 15 SP5
openSUSE Leap 15.5
Ссылки
- E-Mail link for openSUSE-SU-2024:0106-1
- SUSE Security Ratings
- SUSE CVE CVE-2024-3119 page
- SUSE CVE CVE-2024-3120 page
Описание
A buffer overflow vulnerability exists in all versions of sngrep since v0.4.2, due to improper handling of 'Call-ID' and 'X-Call-ID' SIP headers. The functions sip_get_callid and sip_get_xcallid in sip.c use the strncpy function to copy header contents into fixed-size buffers without checking the data length. This flaw allows remote attackers to execute arbitrary code or cause a denial of service (DoS) through specially crafted SIP messages.
Затронутые продукты
Ссылки
- CVE-2024-3119
- SUSE Bug 1222593
Описание
A stack-buffer overflow vulnerability exists in all versions of sngrep since v1.4.1. The flaw is due to inadequate bounds checking when copying 'Content-Length' and 'Warning' headers into fixed-size buffers in the sip_validate_packet and sip_parse_extra_headers functions within src/sip.c. This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via crafted SIP messages.
Затронутые продукты
Ссылки
- CVE-2024-3120
- SUSE Bug 1222594