CVE-2022-21722
Published: 27 January 2022
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
Priority
Status
Package | Release | Status |
---|---|---|
pjproject Launchpad, Ubuntu, Debian |
xenial |
Needs triage
|
bionic |
Needs triage
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
ring Launchpad, Ubuntu, Debian |
trusty |
Ignored
(end of standard support)
|
xenial |
Ignored
(end of standard support)
|
|
bionic |
Not vulnerable
(code not present)
|
|
impish |
Ignored
(end of life)
|
|
lunar |
Not vulnerable
(20230206.0~ds1-5)
|
|
upstream |
Needs triage
|
|
focal |
Released
(20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1)
|
|
mantic |
Not vulnerable
(20230206.0~ds2-1.3)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |