First published: Tue Mar 22 2022(Updated: )
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.12 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24764 is a stack buffer overflow vulnerability in PJSIP versions 2.12 and prior.
Users of PJSUA2 library or users calling the API pjmedia_sdp_print(), pjmedia_sdp_media_print() are affected by CVE-2022-24764.
The severity of CVE-2022-24764 is high, with a severity value of 7.5.
To fix CVE-2022-24764, it is recommended to update to a version of PJSIP that is later than 2.12.
The references for CVE-2022-24764 include: [1] https://security-tracker.debian.org/tracker/CVE-2022-24764, [2] https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m, [3] https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00