SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious input in the configuration file. Attackers can craft a configuration file with oversized values that overflow a stack buffer, overwriting the return address and executing arbitrary code through return-oriented programming gadgets.
| Vendor | Product | Versions |
|---|---|---|
| null | sipp | 3.3 |
Updated vendor to SIPP, changed severity to CRITICAL, and marked exploit as available and actively exploited.
Initial creation