CVE-2022-24764
Stack buffer overflow in pjproject
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
PJSIP es una biblioteca de comunicación multimedia gratuita y de código abierto escrita en C. Las versiones 2.12 y anteriores contienen una vulnerabilidad de desbordamiento del buffer de la pila que afecta a los usuarios de PJSUA2 o a los que llaman a la API "pjmedia_sdp_print(), pjmedia_sdp_media_print()". Las aplicaciones que no usan PJSUA2 y no llaman directamente a "pjmedia_sdp_print()" o "pjmedia_sdp_media_print()" no deberían verse afectadas. Se presenta un parche disponible en la rama "master" del repositorio "pjsip/pjproject" de GitHub. Actualmente no se presentan medidas de mitigación conocidas
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-10 CVE Reserved
- 2022-03-22 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00 | 2023-08-30 | |
https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m | 2023-08-30 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202210-37 | 2023-08-30 | |
https://www.debian.org/security/2022/dsa-5285 | 2023-08-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Teluu Search vendor "Teluu" | Pjsip Search vendor "Teluu" for product "Pjsip" | <= 2.12 Search vendor "Teluu" for product "Pjsip" and version " <= 2.12" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|