First published: Fri Dec 23 2022(Updated: )
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pjsip Pjsip | <2.13.1 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | <=1:16.2.1~dfsg-1+deb10u2 | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23547 is a vulnerability in the PJSIP multimedia communication library that allows for possible buffer overread when parsing a certain STUN message.
CVE-2022-23547 affects PJSIP versions up to 2.13.1, as well as Ubuntu Ring versions 20180228.1.503 and 20190215.1.
CVE-2022-23547 has a severity rating of 9.8 (critical).
To fix CVE-2022-23547 in PJSIP, upgrade to a version higher than 2.13.1.
To fix CVE-2022-23547 in Ubuntu Ring, update to a version higher than 20180228.1.503 or 20190215.1, depending on the specific package.