Description
PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue.
References (7)
Core 7
Core References
Patch, Third Party Advisory
https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae
Third Party Advisory
https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202210-37
Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html
Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5358
Scores
CVSS v3
7.5
EPSS
0.0032
EPSS Percentile
55.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (1)
pjsip/pjsip
< 2.13
Published
Oct 06, 2022
Tracked Since
Feb 18, 2026