Page 5 of 26 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service. PJSIP es una biblioteca de comunicación multimedia de código abierto y gratuita escrita en lenguaje C que implementa protocolos basados ??en estándares como SIP, SDP, RTP, STUN, TURN e ICE. • https://github.com/pjsip/pjproject/commit/97b3d7addbaa720b7ddb0af9bf6f3e443e664365 https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp https://lists.debian.org/debian-lts-announce/2021/04/msg00023.html https://lists.debian.org/debian-lts-announce/2021/05/msg00020.html https://security.gentoo.org/glsa/202107-42 • CWE-400: Uncontrolled Resource Consumption CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.10 and earlier, PJSIP transport can be reused if they have the same IP address + port + protocol. However, this is insufficient for secure transport since it lacks remote hostname authentication. Suppose we have created a TLS connection to `sip.foo.com`, which has an IP address `100.1.1.1`. If we want to create a TLS connection to another hostname, say `sip.bar.com`, which has the same IP address, then it will reuse that existing connection, even though `100.1.1.1` does not have certificate to authenticate as `sip.bar.com`. • https://github.com/pjsip/pjproject/commit/67e46c1ac45ad784db5b9080f5ed8b133c122872 https://github.com/pjsip/pjproject/pull/2663 https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph https://security.gentoo.org/glsa/202107-42 • CWE-295: Improper Certificate Validation CWE-297: Improper Validation of Certificate with Host Mismatch •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2. Teluu PJSIP, en versiones 2.7.1 y anteriores, contiene una vulnerabilidad de desbordamiento de enteros en el análisis SDP de pjmedia que puede resultar en un cierre inesperado. Este ataque parece ser explotable mediante el envío de un mensaje especialmente manipulado. • https://trac.pjsip.org/repos/milestone/release-2.7.2 https://trac.pjsip.org/repos/ticket/2093 https://www.debian.org/security/2018/dsa-4170 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 34%CPEs: 2EXPL: 0

Teluu PJSIP version 2.7.1 and earlier contains a Access of Null/Uninitialized Pointer vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2. Teluu PJSIP, en versiones 2.7.1 y anteriores, contiene una vulnerabilidad de puntero null/no inicializado en el análisis SDP de pjmedia que puede resultar en un cierre inesperado. Este ataque parece ser explotable mediante el envío de un mensaje especialmente manipulado. • https://trac.pjsip.org/repos/milestone/release-2.7.2 https://trac.pjsip.org/repos/ticket/2092 https://trac.pjsip.org/repos/ticket/2094 https://www.debian.org/security/2018/dsa-4170 • CWE-824: Access of Uninitialized Pointer •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue a double key unregistration after an attacker initiates a socket connection with specific settings and sequences. Such double key unregistration will trigger an integer overflow, which may cause ioqueue backends to reject future key registrations. Se ha descubierto un error en Teluu pjproject (pjlib y pjlib-util) en PJSIP, en versiones anteriores a la 2.7.1. El componente ioqueue puede enviar una anulación del registro de una clave doble después de que un atacante inicie una conexión de socket con ajustes y secuencias específicos. • https://trac.pjsip.org/repos/milestone/release-2.7.1 https://trac.pjsip.org/repos/ticket/2055 https://www.debian.org/security/2018/dsa-4170 •