Buffer Overflow Affecting pjsip/pjproject package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.37% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-PJSIPPJPROJECT-2866426
  • published10 Jun 2022
  • disclosed10 Jun 2022
  • creditCossack9989

Introduced: 10 Jun 2022

CVE-2022-31031  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Buffer Overflow that affects users that use STUN in their applications, either by:

  1. setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or

  2. directly using pjlib-util/stun_simple API.

References

CVSS Scores

version 3.1