Vulnerability CVE-2022-24764


Published: 2022-03-22

Description:
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.

Type:

CWE-120

(Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Teluu -> Pjsip 

 References:
https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html

Copyright 2024, cxsecurity.com

 

Back to Top