// For flags

CVE-2022-23608

Use after free in PJSIP

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.

PJSIP es una biblioteca de comunicación multimedia gratuita y de código abierto escrita en lenguaje C que implementa protocolos basados en estándares como SIP, SDP, RTP, STUN, TURN e ICE. En las versiones hasta la versión 2.11.1 inclusive, cuando se encuentra en un escenario de conjunto de diálogos (o bifurcación), una clave hash compartida por varios diálogos de UAC puede potencialmente liberarse prematuramente cuando se destruye uno de los diálogos. El problema puede hacer que un conjunto de diálogos se registre en la tabla hash varias veces (con diferentes claves hash), lo que lleva a un comportamiento indefinido, como la colisión de la lista de diálogos, lo que eventualmente conduce a un bucle sin fin. Hay un parche disponible en la confirmación db3235953baa56d2fb0e276ca510fefca751643f que se incluirá en la próxima versión. No hay soluciones alternativas conocidas para este problema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-19 CVE Reserved
  • 2022-02-22 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-11-07 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Teluu
Search vendor "Teluu"
Pjsip
Search vendor "Teluu" for product "Pjsip"
<= 2.11.1
Search vendor "Teluu" for product "Pjsip" and version " <= 2.11.1"
-
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
< 16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version " < 16.8.0"
-
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert1
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert10
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert11
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert12
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert2
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert3
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert4
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert5
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert6
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert7
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert8
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert9
Affected
Sangoma
Search vendor "Sangoma"
Asterisk
Search vendor "Sangoma" for product "Asterisk"
>= 16.0.0 < 16.24.1
Search vendor "Sangoma" for product "Asterisk" and version " >= 16.0.0 < 16.24.1"
-
Affected
Sangoma
Search vendor "Sangoma"
Asterisk
Search vendor "Sangoma" for product "Asterisk"
>= 18.0.0 < 18.10.1
Search vendor "Sangoma" for product "Asterisk" and version " >= 18.0.0 < 18.10.1"
-
Affected
Sangoma
Search vendor "Sangoma"
Asterisk
Search vendor "Sangoma" for product "Asterisk"
>= 19.0.0 < 19.2.1
Search vendor "Sangoma" for product "Asterisk" and version " >= 19.0.0 < 19.2.1"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected