First published: Thu Jan 27 2022(Updated: )
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Asterisk Certified Asterisk | =16.8.0 | |
Asterisk Certified Asterisk | =16.8.0-cert1 | |
Asterisk Certified Asterisk | =16.8.0-cert10 | |
Asterisk Certified Asterisk | =16.8.0-cert11 | |
Asterisk Certified Asterisk | =16.8.0-cert12 | |
Asterisk Certified Asterisk | =16.8.0-cert2 | |
Asterisk Certified Asterisk | =16.8.0-cert3 | |
Asterisk Certified Asterisk | =16.8.0-cert4 | |
Asterisk Certified Asterisk | =16.8.0-cert5 | |
Asterisk Certified Asterisk | =16.8.0-cert6 | |
Asterisk Certified Asterisk | =16.8.0-cert7 | |
Asterisk Certified Asterisk | =16.8.0-cert8 | |
Asterisk Certified Asterisk | =16.8.0-cert9 | |
Sangoma Asterisk | >=16.0.0<16.24.1 | |
Sangoma Asterisk | >=18.0.0<18.10.1 | |
Sangoma Asterisk | >=19.0.0<19.2.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21723 is a vulnerability in the PJSIP library that allows remote attackers to cause a denial of service (DoS) and potentially execute arbitrary code.
CVE-2022-21723 has a severity rating of 9.1 (Critical).
Versions 2.11.1 and prior of Teluu Pjsip, Certified Asterisk 16.8.0, and Sangoma Asterisk 16.0.0 - 16.24.1, 18.0.0 - 18.10.1, and 19.0.0 - 19.2.1 are affected by CVE-2022-21723.
CVE-2022-21723 can be exploited by sending a malformed multipart SIP message, which can lead to out-of-bounds read/write access and potential code execution.
Yes, updating to the latest version of the affected software or applying the relevant patches provided by the vendors can fix CVE-2022-21723.