Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2.
References
Link | Resource |
---|---|
https://trac.pjsip.org/repos/milestone/release-2.7.2 | Vendor Advisory |
https://trac.pjsip.org/repos/ticket/2093 | Vendor Advisory |
https://www.debian.org/security/2018/dsa-4170 | Third Party Advisory |
https://trac.pjsip.org/repos/milestone/release-2.7.2 | Vendor Advisory |
https://trac.pjsip.org/repos/ticket/2093 | Vendor Advisory |
https://www.debian.org/security/2018/dsa-4170 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://trac.pjsip.org/repos/milestone/release-2.7.2 - Vendor Advisory | |
References | () https://trac.pjsip.org/repos/ticket/2093 - Vendor Advisory | |
References | () https://www.debian.org/security/2018/dsa-4170 - Third Party Advisory |
Information
Published : 2018-03-13 01:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000098
Mitre link : CVE-2018-1000098
CVE.ORG link : CVE-2018-1000098
JSON object : View
Products Affected
teluu
- pjsip
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound