CVE-2018-25225 PUBLISHED

SIPP 3.3 Stack-Based Buffer Overflow via Configuration File

Assigner: VulnCheck
Reserved: 28.03.2026 Published: 28.03.2026 Updated: 28.03.2026

SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious input in the configuration file. Attackers can craft a configuration file with oversized values that overflow a stack buffer, overwriting the return address and executing arbitrary code through return-oriented programming gadgets.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor Sipp
Product SIPP
Versions
  • Version 3.3 is affected

Credits

  • Juan Sacco <jsacco@exploitpack.com> - http://exploitpack.com finder

References

Problem Types

  • Missing Authentication for Critical Function CWE