CVE-2017-16872

An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
Configurations

Configuration 1 (hide)

cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:17

Type Values Removed Values Added
References () https://trac.pjsip.org/repos/milestone/release-2.7.1 - Release Notes, Vendor Advisory () https://trac.pjsip.org/repos/milestone/release-2.7.1 - Release Notes, Vendor Advisory
References () https://trac.pjsip.org/repos/ticket/2056 - Vendor Advisory () https://trac.pjsip.org/repos/ticket/2056 - Vendor Advisory
References () https://www.debian.org/security/2018/dsa-4170 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4170 - Third Party Advisory

Information

Published : 2017-11-17 09:29

Updated : 2024-11-21 03:17


NVD link : CVE-2017-16872

Mitre link : CVE-2017-16872

CVE.ORG link : CVE-2017-16872


JSON object : View

Products Affected

teluu

  • pjsip

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer