An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
References
Link | Resource |
---|---|
https://trac.pjsip.org/repos/ticket/2056 | Vendor Advisory |
https://trac.pjsip.org/repos/milestone/release-2.7.1 | Release Notes Vendor Advisory |
https://www.debian.org/security/2018/dsa-4170 | Third Party Advisory |
Information
Published : 2017-11-17 01:29
Updated : 2021-09-02 07:49
NVD link : CVE-2017-16872
Mitre link : CVE-2017-16872
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
debian
- debian_linux
teluu
- pjsip