Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-23537

Опубликовано: 20 дек. 2022
Источник: debian
EPSS Низкий

Описание

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:20.4.0~dfsg+~cs6.13.40431414-1package
ringfixed20230206.0~ds1-1package
pjprojectremovedpackage

Примечания

  • https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w

  • https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1

EPSS

Процентиль: 41%
0.00191
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).

CVSS3: 6.5
nvd
больше 2 лет назад

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость мультимедиа библиотеки PJSIP, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код в целевой системе

CVSS3: 6.5
redos
больше 2 лет назад

Уязвимость pjproject

EPSS

Процентиль: 41%
0.00191
Низкий