This pull request addresses critical vulnerabilities in sngrep's SIP header processing, specifically related to stack buffer overflows in "Call-ID", "X-Call-ID", "content-length", and "warning" headers. The fixes introduce bounds checking and ensure string null-termination, mitigating the risk of arbitrary code execution or DoS from malicious SIP messages.
This pull request addresses critical vulnerabilities in sngrep's SIP header processing, specifically related to stack buffer overflows in "Call-ID", "X-Call-ID", "content-length", and "warning" headers. The fixes introduce bounds checking and ensure string null-termination, mitigating the risk of arbitrary code execution or DoS from malicious SIP messages.