CVE-2022-24763
Infinite Loop in PJSIP
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.
PJSIP es una biblioteca de comunicación multimedia gratuita y de código abierto escrita en lenguaje C. Las versiones 2.12 y anteriores contienen una vulnerabilidad de denegación de servicio que afecta a usuarios de PJSIP que consumen el análisis XML de PJSIP en sus aplicaciones. Es recomendado a usuarios actualizar. No se presentan medidas de mitigación conocidas
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-10 CVE Reserved
- 2022-03-30 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21 | 2024-01-25 | |
https://github.com/pjsip/pjproject/security/advisories/GHSA-5x45-qp78-g4p4 | 2024-01-25 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202210-37 | 2024-01-25 | |
https://www.debian.org/security/2022/dsa-5285 | 2024-01-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Pjsip Search vendor "Pjsip" | Pjsip Search vendor "Pjsip" for product "Pjsip" | <= 2.12 Search vendor "Pjsip" for product "Pjsip" and version " <= 2.12" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|