First published: Tue Dec 20 2022(Updated: )
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <2.13.1 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
Debian Debian Linux | =10.0 | |
debian/asterisk | <=1:16.2.1~dfsg-1+deb10u2 | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23537 is a vulnerability in the PJSIP library that allows buffer overread when parsing a specially crafted STUN message with unknown attribute.
Teluu Pjsip version up to 2.13.1, Asterisk version up to 1:16.28.0~dfsg-0+deb10u3, 1:16.28.0~dfsg-0+deb11u2, 1:16.28.0~dfsg-0+deb11u3, and 1:20.4.0~dfsg+~cs6.13.40431414-2, and Ring version up to 20190215.1.f152c98~ds1-1+deb10u2, 20230206.0~ds2-1.1, and 20230206.0~ds2-1.3 are affected by CVE-2022-23537.
CVE-2022-23537 has a severity rating of 9.8 (Critical).
To fix CVE-2022-23537 in Teluu Pjsip, update to version 2.13.2 or later.
To fix CVE-2022-23537 in Asterisk, update to version 1:16.2.1~dfsg-1+deb10u2 or later, 1:16.28.0~dfsg-0+deb11u2 or later, 1:16.28.0~dfsg-0+deb11u3 or later, or 1:20.4.0~dfsg+~cs6.13.40431414-3 or later.
To fix CVE-2022-23537 in Ring, update to version 20190215.1.f152c98~ds1-1+deb10u3 or later, 20230206.0~ds2-1.2 or later, or 20230206.0~ds2-1.4 or later.