ALT-PU-2024-15954-2
Closed vulnerabilities
BDU:2022-01086
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с целочисленной потерей значимости, позволяющая нарушителю выполнить произвольный код
BDU:2022-01087
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-01449
Уязвимость функции pjsua_playlist_create мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код
BDU:2022-01450
Уязвимость функции pjsua_call_dump мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный кодд
BDU:2022-01451
Уязвимость функции pjsua_recorder_create мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код
BDU:2022-01452
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2022-01458
Уязвимость функции pjsua_recorder_create мультимедийной коммуникационной библиотеки PJSIP, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02055
Уязвимость SSL-сокета системы управления IP-телефонией Asterisk, реализации протокола SIP PJSIP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02185
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02186
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02207
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02209
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03168
Уязвимость реализации функции pjsip_auth_create_digest() мультимедийной коммуникационной библиотеки PJSIP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-03169
Уязвимость мультимедийной коммуникационной библиотеки PJSIP, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03171
Уязвимость реализации функций pjmedia_sdp_print() и pjmedia_sdp_media_print() интерфейса PJSUA2 API мультимедийной коммуникационной библиотеки PJSI, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-07479
Уязвимость мультимедиа библиотеки PJSIP, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код в целевой системе
Modified: 2024-11-21
CVE-2021-32686
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. Both issues were reported to happen intermittently in heavy load TLS connections. They cause a crash, resulting in a denial of service. These are fixed in version 2.11.1.
- https://github.com/pjsip/pjproject/commit/d5f95aa066f878b0aef6a64e60b61e8626e664cd
- https://github.com/pjsip/pjproject/commit/d5f95aa066f878b0aef6a64e60b61e8626e664cd
- https://github.com/pjsip/pjproject/pull/2716
- https://github.com/pjsip/pjproject/pull/2716
- https://github.com/pjsip/pjproject/releases/tag/2.11.1
- https://github.com/pjsip/pjproject/releases/tag/2.11.1
- https://github.com/pjsip/pjproject/security/advisories/GHSA-cv8x-p47p-99wr
- https://github.com/pjsip/pjproject/security/advisories/GHSA-cv8x-p47p-99wr
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-4999
- DSA-4999
Modified: 2024-11-21
CVE-2021-37706
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- 20220304 AST-2022-004: pjproject: integer underflow on STUN message
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-41141
PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch.
- https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
- https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- GLSA-202210-37
- GLSA-202210-37
Modified: 2024-11-21
CVE-2021-43299
Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43300
Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43301
Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43302
Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43303
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43804
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
- https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
- https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
- https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
- https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2021-43845
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
- https://github.com/pjsip/pjproject/pull/2924
- https://github.com/pjsip/pjproject/pull/2924
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-21722
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
- https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
- https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
- https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
- https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- 20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-23537
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
- https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
- https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
- https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
- https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Modified: 2024-11-21
CVE-2022-23608
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- 20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-24754
PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.
- https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
- https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
- https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
- https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
Modified: 2024-11-21
CVE-2022-24764
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
- https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
- https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-24792
PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first.
- https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
- https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
- https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
- https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
- [debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update
- [debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5285
- DSA-5285
Modified: 2024-11-21
CVE-2022-31031
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
- https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
- https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
- https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
- https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- [debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- GLSA-202210-37
- GLSA-202210-37
- DSA-5358
- DSA-5358
Modified: 2024-11-21
CVE-2023-27585
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
- https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
- https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
- https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
- https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
- https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
- https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
- [debian-lts-announce] 20230418 [SECURITY] [DLA 3394-1] asterisk security update
- [debian-lts-announce] 20230418 [SECURITY] [DLA 3394-1] asterisk security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update
- DSA-5438
- DSA-5438
- https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
- https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
Modified: 2024-11-21
CVE-2023-38703
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
- https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d
- https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
- https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
- https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html