An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
References
Link | Resource |
---|---|
https://trac.pjsip.org/repos/milestone/release-2.7.1 | Release Notes Vendor Advisory |
https://trac.pjsip.org/repos/ticket/2056 | Vendor Advisory |
https://www.debian.org/security/2018/dsa-4170 | Third Party Advisory |
https://trac.pjsip.org/repos/milestone/release-2.7.1 | Release Notes Vendor Advisory |
https://trac.pjsip.org/repos/ticket/2056 | Vendor Advisory |
https://www.debian.org/security/2018/dsa-4170 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://trac.pjsip.org/repos/milestone/release-2.7.1 - Release Notes, Vendor Advisory | |
References | () https://trac.pjsip.org/repos/ticket/2056 - Vendor Advisory | |
References | () https://www.debian.org/security/2018/dsa-4170 - Third Party Advisory |
Information
Published : 2017-11-17 09:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-16872
Mitre link : CVE-2017-16872
CVE.ORG link : CVE-2017-16872
JSON object : View
Products Affected
teluu
- pjsip
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer