This exploit demonstrates a local buffer overflow in SIPp v3.3.990 by passing overly long strings to command-line arguments. The PoC uses Python to generate a string of 300 'A' characters, which triggers the overflow when passed to specific SIPp options.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:SIPp v3.3.990
No auth needed
Prerequisites:Local access to the system running SIPp