Description
SIPp 3.6 and earlier contains a local buffer overflow vulnerability in command-line argument handling that allows local attackers to crash the application or execute arbitrary code. Attackers can trigger the vulnerability by supplying oversized input to the -3pcc, -i, or -log_file parameters, causing strcpy to write beyond buffer boundaries in sipp.cpp.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Fakhri Zulkifli
References
www.exploit-db.com/exploits/44962 (ExploitDB-44962)
sipp.sourceforge.net/ (Official Product Homepage)
github.com/SIPp/sipp/releases (Product Reference)
www.vulncheck.com/...fer-overflow-via-command-line-arguments (VulnCheck Advisory: SIPp 3.6 Local Buffer Overflow via Command-line Arguments)