Impact
The vulnerability is a local buffer overflow that occurs when SIPp parses command‑line arguments. Oversized values supplied to the -3pcc, -i, or -log_file options cause the unsafe strcpy call in sipp.cpp to write past the buffer's boundaries, allowing a local attacker to crash the application or execute arbitrary code.
Affected Systems
All publicly released SIPp versions 3.6 and earlier are affected, including the official releases distributed on sourceforge and the GitHub releases prior to the 3.7 update.
Risk and Exploitability
The CVSS score of 8.6 reflects a high‑severity local code‑execution flaw. The EPSS score is not currently available, so the exact probability of exploitation today is uncertain, but because the vulnerability requires local privileges the attack access is limited to users who can run SIPp on the affected system. The flaw is not listed in the CISA KEV catalog, indicating that known attacks are not reported yet.
OpenCVE Enrichment