Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2.
                
            References
                    | Link | Resource | 
|---|---|
| https://trac.pjsip.org/repos/milestone/release-2.7.2 | Vendor Advisory | 
| https://trac.pjsip.org/repos/ticket/2093 | Vendor Advisory | 
| https://www.debian.org/security/2018/dsa-4170 | Third Party Advisory | 
| https://trac.pjsip.org/repos/milestone/release-2.7.2 | Vendor Advisory | 
| https://trac.pjsip.org/repos/ticket/2093 | Vendor Advisory | 
| https://www.debian.org/security/2018/dsa-4170 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:39
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://trac.pjsip.org/repos/milestone/release-2.7.2 - Vendor Advisory | |
| References | () https://trac.pjsip.org/repos/ticket/2093 - Vendor Advisory | |
| References | () https://www.debian.org/security/2018/dsa-4170 - Third Party Advisory | 
Information
                Published : 2018-03-13 01:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000098
Mitre link : CVE-2018-1000098
CVE.ORG link : CVE-2018-1000098
JSON object : View
Products Affected
                teluu
- pjsip
 
debian
- debian_linux
 
CWE
                
                    
                        
                        CWE-190
                        
            Integer Overflow or Wraparound
