Description
SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious input in the configuration file. Attackers can craft a configuration file with oversized values that overflow a stack buffer, overwriting the return address and executing arbitrary code through return-oriented programming gadgets.
Published: 2026-03-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Immediate Patch
AI Analysis

Impact

SIPP 3.3 contains a stack based buffer overflow that can be triggered by providing a malformed configuration file. By crafting configuration entries with values that exceed the expected length, the overflow overwrites the stack return address, allowing an attacker to redirect execution flow with return oriented programming gadgets. Because the vulnerability is local and does not require authentication, any user who can write or replace the configuration file used by SIPP can obtain arbitrary code execution on the host.

Affected Systems

The affected product is SIPP version 3.3, as distributed by the Sipp Project. No other versions are specifically noted in the advisory, so only the 3.3 release is confirmed to contain the flaw.

Risk and Exploitability

The CVSS scoring of 8.6 indicates a high severity level, though the EPSS score of less than 1% suggests that exploitation is currently rare or not widely observed. The vulnerability is listed as local, unauthenticated code execution, and is not included in the CISA KEV catalog, implying no known public exploits at the time of the advisory. Because the attack vector relies on local file system access, an attacker would need permission to create or modify the configuration file used by SIPP. The absence of a remote or privilege escalation vector limits the immediate exposure to environments where SIPP is exposed to local users.

Generated by OpenCVE AI on April 8, 2026 at 20:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SIPP to the latest version that fixes the buffer overflow.
  • If an upgrade is not possible, run SIPP under a non-privileged account and restrict write permissions on its configuration directory so that only trusted users can modify the files.
  • Validate the configuration file before use, ensuring that all numeric fields contain values within the allowed range and that no oversized strings are present.
  • Monitor system logs for abnormal access patterns or attempts to inject malformed configuration files.

Generated by OpenCVE AI on April 8, 2026 at 20:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Sipp Project
Sipp Project sipp
CPEs cpe:2.3:a:sipp_project:sipp:3.3:*:*:*:*:*:*:*
Vendors & Products Sipp Project
Sipp Project sipp

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Sipp
Sipp sipp
Vendors & Products Sipp
Sipp sipp

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious input in the configuration file. Attackers can craft a configuration file with oversized values that overflow a stack buffer, overwriting the return address and executing arbitrary code through return-oriented programming gadgets.
Title SIPP 3.3 Stack-Based Buffer Overflow via Configuration File
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T14:07:37.759Z

Reserved: 2026-03-28T11:50:18.468Z

Link: CVE-2018-25225

cve-icon Vulnrichment

Updated: 2026-03-30T14:07:27.327Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-28T12:16:03.560

Modified: 2026-04-08T19:36:28.587

Link: CVE-2018-25225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:29:30Z

Weaknesses