CVE-2022-39269 Affecting pjproject package, versions <2.13-r0


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE319-PJPROJECT-6108094
  • published8 Dec 2023
  • disclosed6 Oct 2022

Introduced: 6 Oct 2022

CVE-2022-39269  (opens in a new tab)

How to fix?

Upgrade Alpine:3.19 pjproject to version 2.13-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pjproject package and not the pjproject package as distributed by Alpine. See How to fix? for Alpine:3.19 relevant fixed versions and status.

PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability.

CVSS Scores

version 3.1