PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 | Patch Third Party Advisory |
https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202210-37 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2022/dsa-5285 | Third Party Advisory |
Information
Published : 2022-01-26 16:15
Updated : 2023-02-02 10:29
NVD link : CVE-2022-21722
Mitre link : CVE-2022-21722
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
debian
- debian_linux
teluu
- pjsip