Description
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
References (9)
Core 9
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202210-37
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2022/dsa-5285
Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Patch, Third Party Advisory
https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
Exploit, Issue Tracking, Patch, Third Party Advisory
https://github.com/pjsip/pjproject/pull/2924
Patch, Third Party Advisory
https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
Scores
CVSS v3
8.2
EPSS
0.0029
EPSS Percentile
52.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
9.0
debian/debian_linux
10.0
debian/debian_linux
11.0
teluu/pjsip
< 2.11.1
Published
Dec 27, 2021
Tracked Since
Feb 18, 2026