Vulnerability Database

289,784

Total vulnerabilities in the database

CVE-2022-21723

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the master branch. There are no known workarounds.

  • Published: Jan 27, 2022
  • Updated: Apr 14, 2023
  • CVE: CVE-2022-21723
  • Severity: Critical
  • Exploit:

CVSS v3:

  • Severity: Critical
  • Score: 9.1
  • AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVSS v2:

  • Severity: Medium
  • Score: 6.4
  • AV:N/AC:L/Au:N/C:P/I:N/A:P

CWEs:

Software From Fixed in
teluu / pjsip - 2.11.1.x
asterisk / certified_asterisk 16.8.0-cert12 16.8.0-cert12.x
asterisk / certified_asterisk 16.8.0-cert11 16.8.0-cert11.x
asterisk / certified_asterisk 16.8.0-cert10 16.8.0-cert10.x
asterisk / certified_asterisk 16.8.0-cert9 16.8.0-cert9.x
asterisk / certified_asterisk 16.8.0-cert8 16.8.0-cert8.x
asterisk / certified_asterisk 16.8.0-cert7 16.8.0-cert7.x
asterisk / certified_asterisk 16.8.0-cert6 16.8.0-cert6.x
asterisk / certified_asterisk 16.8.0-cert5 16.8.0-cert5.x
asterisk / certified_asterisk 16.8.0-cert4 16.8.0-cert4.x
asterisk / certified_asterisk 16.8.0-cert3 16.8.0-cert3.x
asterisk / certified_asterisk 16.8.0-cert2 16.8.0-cert2.x
asterisk / certified_asterisk 16.8.0-cert1 16.8.0-cert1.x
asterisk / certified_asterisk 16.8.0 16.8.0.x
sangoma / asterisk 16.0.0 16.24.1
sangoma / asterisk 19.0.0 19.2.1
sangoma / asterisk 18.0.0 18.10.1
debian / debian_linux 9.0 9.0.x
debian / debian_linux 10.0 10.0.x