PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
References
Configurations
History
21 Nov 2024, 06:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a - Patch, Third Party Advisory | |
References | () https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html - | |
References | () https://security.gentoo.org/glsa/202210-37 - Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5285 - Third Party Advisory |
18 Nov 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (GENTOO) https://security.gentoo.org/glsa/202210-37 - Third Party Advisory |
31 Oct 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jun 2022, 02:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - Mailing List, Third Party Advisory |
28 Mar 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Feb 2022, 18:08
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
References | (MISC) https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a - Patch, Third Party Advisory | |
References | (CONFIRM) https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
27 Jan 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-27 00:15
Updated : 2024-11-21 06:45
NVD link : CVE-2022-21722
Mitre link : CVE-2022-21722
CVE.ORG link : CVE-2022-21722
JSON object : View
Products Affected
teluu
- pjsip
debian
- debian_linux
CWE
CWE-125
Out-of-bounds Read