Buffer Overflow Affecting pjproject package, versions <2.5.5~dfsg-6+deb9u3


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.29% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-PJPROJECT-2421474
  • published12 Mar 2022
  • disclosed11 Mar 2022

Introduced: 11 Mar 2022

CVE-2022-24754  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade Debian:9 pjproject to version 2.5.5~dfsg-6+deb9u3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pjproject package and not the pjproject package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type PJSIP_CRED_DATA_DIGEST). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to PJSIP_MD5STRLEN before passing to PJSIP.

CVSS Scores

version 3.1