
CVE-2023-38703 – PJSIP has use-after-free vulnerability in SRTP media transport
https://notcve.org/view.php?id=CVE-2023-38703
06 Oct 2023 — PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport oth... • https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d • CWE-416: Use After Free •

CVE-2023-27585 – Debian Security Advisory 5438-1
https://notcve.org/view.php?id=CVE-2023-27585
14 Mar 2023 — PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. • https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-122: Heap-based Buffer Overflow •

CVE-2022-23547 – Heap buffer overflow in pjproject when decoding STUN message
https://notcve.org/view.php?id=CVE-2022-23547
23 Dec 2022 — PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch. • https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36 • CWE-122: Heap-based Buffer Overflow CWE-125: Out-of-bounds Read •

CVE-2022-23537 – PJSIP vulnerable to heap buffer overflow when decoding STUN message
https://notcve.org/view.php?id=CVE-2022-23537
20 Dec 2022 — PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1). PJSIP es una librería de comunicación multimedia gratuita y de código abierto escrita en leng... • https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1 • CWE-122: Heap-based Buffer Overflow CWE-125: Out-of-bounds Read •

CVE-2022-39244 – Buffer overflow in pjlib scanner and pjmedia
https://notcve.org/view.php?id=CVE-2022-39244
06 Oct 2022 — PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. • https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-39269 – Media transport downgrade from the secure version (SRTP) to non-secure (RTP) in pjsip
https://notcve.org/view.php?id=CVE-2022-39269
06 Oct 2022 — PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. • https://github.com/pjsip/pjproject/commit/d2acb9af4e27b5ba75d658690406cec9c274c5cc • CWE-319: Cleartext Transmission of Sensitive Information •

CVE-2022-31031 – Potential stack buffer overflow when parsing message as a STUN client
https://notcve.org/view.php?id=CVE-2022-31031
07 Jun 2022 — PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the n... • https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-24792 – Potential infinite loop when parsing WAV format file in PJSIP
https://notcve.org/view.php?id=CVE-2022-24792
25 Apr 2022 — PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repo... • https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2022-24786 – Potential out-of-bound read/write in PJSIP
https://notcve.org/view.php?id=CVE-2022-24786
06 Apr 2022 — PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds. PJSIP es una librería de comunicación multimedia gratuita y de código abierto escrita en C. • https://github.com/pjsip/pjproject/commit/11559e49e65bdf00922ad5ae28913ec6a198d508 • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •

CVE-2022-24793 – Potential heap buffer overflow when parsing DNS packets in PJSIP
https://notcve.org/view.php?id=CVE-2022-24793
06 Apr 2022 — PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. • https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •