CVE-2022-21722

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

30 Aug 2023, 01:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html -

02 Feb 2023, 18:29

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5285 - (DEBIAN) https://www.debian.org/security/2022/dsa-5285 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

18 Nov 2022, 16:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5285 -

17 Nov 2022, 14:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html -

16 Nov 2022, 19:08

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202210-37 - (GENTOO) https://security.gentoo.org/glsa/202210-37 - Third Party Advisory

31 Oct 2022, 22:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202210-37 -

05 Jun 2022, 02:45

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - Mailing List, Third Party Advisory
First Time Debian debian Linux
Debian
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

28 Mar 2022, 17:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html -

02 Feb 2022, 18:08

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.4
v3 : 9.1
First Time Teluu pjsip
Teluu
CPE cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*
CWE CWE-125
References (CONFIRM) https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 - (CONFIRM) https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 - Patch, Third Party Advisory
References (MISC) https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a - (MISC) https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a - Patch, Third Party Advisory

27 Jan 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-27 00:15

Updated : 2023-12-10 14:09


NVD link : CVE-2022-21722

Mitre link : CVE-2022-21722

CVE.ORG link : CVE-2022-21722


JSON object : View

Products Affected

teluu

  • pjsip

debian

  • debian_linux
CWE
CWE-125

Out-of-bounds Read