PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202 | Patch Third Party Advisory |
https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html | Mailing List |
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html | |
https://security.gentoo.org/glsa/202210-37 | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5358 | Third Party Advisory |
https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202 | Patch Third Party Advisory |
https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html | Mailing List |
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html | |
https://security.gentoo.org/glsa/202210-37 | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5358 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202 - Patch, Third Party Advisory | |
References | () https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html - | |
References | () https://security.gentoo.org/glsa/202210-37 - Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5358 - Third Party Advisory |
30 Aug 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-120 |
29 Jun 2023, 14:25
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html - Mailing List | |
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5358 - Third Party Advisory | |
First Time |
Debian
Debian debian Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
Information
Published : 2022-06-09 16:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-31031
Mitre link : CVE-2022-31031
CVE.ORG link : CVE-2022-31031
JSON object : View
Products Affected
teluu
- pjsip
debian
- debian_linux