Pjsip Pjproject vulnerabilities
37 known vulnerabilities affecting pjsip/pjproject.
Total CVEs
37
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL14HIGH18MEDIUM5
Vulnerabilities
Page 2 of 2
CVE-2022-24754CRITICALCVSS 9.8≤ 2.122022-03-11
CVE-2022-24754 [CRITICAL] CWE-120 CVE-2022-24754: PJSIP is a free and open source multimedia communication library written in C language. In versions
PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master bran
nvd
CVE-2022-23608CRITICALCVSS 9.8≤ 2.11.12022-02-22
CVE-2022-23608 [CRITICAL] CWE-416 CVE-2022-23608: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dia
nvd
CVE-2022-21723CRITICALCVSS 9.1≤ 2.11.12022-01-27
CVE-2022-21723 [CRITICAL] CWE-125 CVE-2022-21723: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users
nvd
CVE-2022-21722CRITICALCVSS 9.1≤ 2.11.12022-01-27
CVE-2022-21722 [CRITICAL] CWE-125 CVE-2022-21722: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects a
nvd
CVE-2021-41141HIGHCVSS 7.5≤ 2.11.12022-01-04
CVE-2021-41141 [HIGH] CWE-667 CVE-2021-41141: PJSIP is a free and open source multimedia communication library written in the C language implement
PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, whic
nvdosv
CVE-2021-43845CRITICALCVSS 9.1≤ 2.11.12021-12-27
CVE-2021-43845 [CRITICAL] CWE-125 CVE-2021-43845: PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if in
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR mes
nvd
CVE-2021-37706CRITICALCVSS 9.8≤ 2.11.12021-12-22
CVE-2021-37706 [CRITICAL] CWE-191 CVE-2021-37706: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting
nvd
CVE-2021-43804HIGHCVSS 7.3≤ 2.11.12021-12-22
CVE-2021-43804 [HIGH] CWE-125 CVE-2021-43804: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in a
nvd
CVE-2021-32686MEDIUMCVSS 5.9fixed in 2.11.12021-07-23
CVE-2021-32686 [MEDIUM] CWE-362 CVE-2021-32686: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group
nvd
CVE-2020-15260MEDIUMCVSS 6.8≤ 2.102021-03-10
CVE-2020-15260 [MEDIUM] CWE-297 CVE-2020-15260: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.10 and earlier, PJSIP transport can be reused if they have the same IP address + port + protocol. However, this is insufficient for secure transport since it lacks remote
nvd
CVE-2021-21375MEDIUMCVSS 6.5≤ 2.102021-03-10
CVE-2021-21375 [MEDIUM] CWE-400 CVE-2021-21375: PJSIP is a free and open source multimedia communication library written in C language implementing
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This
nvd
CVE-2018-1000099HIGHCVSS 7.5≥ 0, < 2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm12018-03-13
CVE-2018-1000099 [HIGH] CVE-2018-1000099: Teluu PJSIP version 2
Teluu PJSIP version 2.7.1 and earlier contains a Access of Null/Uninitialized Pointer vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2.
osv
CVE-2018-1000098HIGHCVSS 7.5≥ 0, < 2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm12018-03-13
CVE-2018-1000098 [HIGH] CVE-2018-1000098: Teluu PJSIP version 2
Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2.
osv
CVE-2017-16872CRITICALCVSS 9.8≥ 0, < 2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm12017-11-17
CVE-2017-16872 [CRITICAL] CVE-2017-16872: An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit usi
osv
CVE-2017-16875HIGHCVSS 7.5≥ 0, < 2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm12017-11-17
CVE-2017-16875 [HIGH] CVE-2017-16875: An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue a double key unregistration after an attacker initiates a socket connection with specific settings and sequences. Such double key unregistration will trigger an integer overflow, which may cause ioqueue backends to reject future key registrations.
osv
CVE-2017-9372HIGHCVSS 7.5≥ 0, < 2.1.0.0.ast20130823-1+deb8u1build0.14.04.1≥ 0, < 2.1.0.0.ast20130823-1+deb8u1build0.16.04.12017-06-02
CVE-2017-9372 [HIGH] CVE-2017-9372: PJSIP, as used in Asterisk Open Source 13
PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter.
osv
CVE-2017-9359HIGHCVSS 7.5≥ 0, < 2.1.0.0.ast20130823-1+deb8u1build0.14.04.1≥ 0, < 2.1.0.0.ast20130823-1+deb8u1build0.16.04.12017-06-02
CVE-2017-9359 [HIGH] CVE-2017-9359: The multi-part body parser in PJSIP, as used in Asterisk Open Source 13
The multi-part body parser in PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
osv
← Previous2 / 2