Buffer Overflow Affecting pjproject package, versions <2.12.1-r0


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.29% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE316-PJPROJECT-2843797
  • published24 May 2022
  • disclosed11 Mar 2022

Introduced: 11 Mar 2022

CVE-2022-24754  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade Alpine:3.16 pjproject to version 2.12.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pjproject package and not the pjproject package as distributed by Alpine. See How to fix? for Alpine:3.16 relevant fixed versions and status.

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type PJSIP_CRED_DATA_DIGEST). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to PJSIP_MD5STRLEN before passing to PJSIP.

CVSS Scores

version 3.1