CVE-2022-21722

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

18 Nov 2022, 16:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5285 -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html -
References (GENTOO) https://security.gentoo.org/glsa/202210-37 - (GENTOO) https://security.gentoo.org/glsa/202210-37 - Third Party Advisory

31 Oct 2022, 22:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202210-37 -

05 Jun 2022, 02:45

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - Mailing List, Third Party Advisory

28 Mar 2022, 17:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html -

02 Feb 2022, 18:08

Type Values Removed Values Added
CWE CWE-125
References (MISC) https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a - (MISC) https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a - Patch, Third Party Advisory
References (CONFIRM) https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 - (CONFIRM) https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 - Patch, Third Party Advisory
CPE cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.4
v3 : 9.1

27 Jan 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-27 00:15

Updated : 2024-02-04 22:08


NVD link : CVE-2022-21722

Mitre link : CVE-2022-21722

CVE.ORG link : CVE-2022-21722


JSON object : View

Products Affected

teluu

  • pjsip

debian

  • debian_linux
CWE
CWE-125

Out-of-bounds Read