Description
A flaw was found in SIPp. A remote attacker could exploit this by sending specially crafted Session Initiation Protocol (SIP) messages during an active call. This vulnerability, a NULL pointer dereference, can cause the application to crash, leading to a denial of service. Under specific conditions, it may also allow an attacker to execute unauthorized code, compromising the system's integrity and availability.
Problem types
Product status
3.7.3 (semver)
Timeline
| 2026-01-08: | Reported to Red Hat. |
| 2026-01-08: | Made public. |
Credits
Red Hat would like to thank ChenYiFan Liu, Fanny-wen, and Zhoufan Wen for reporting this issue.
References
access.redhat.com/security/cve/CVE-2026-0710
bugzilla.redhat.com/show_bug.cgi?id=2427788 (RHBZ#2427788)