Lucene search

K
cveGitHub_MCVE-2022-23608
HistoryFeb 22, 2022 - 8:15 p.m.

CVE-2022-23608

2022-02-2220:15:07
CWE-416
GitHub_M
web.nvd.nist.gov
141
3
pjsip
multimedia communication library
sip
sdp
rtp
stun
turn
ice
cve-2022-23608
dialog set
hash key
patch
vulnerability

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.012

Percentile

85.4%

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.

Affected configurations

Nvd
Vulners
Node
teluupjsipRange2.11.1
Node
asteriskcertified_asteriskRange<16.8.0
OR
asteriskcertified_asteriskMatch16.8.0cert1
OR
asteriskcertified_asteriskMatch16.8.0cert10
OR
asteriskcertified_asteriskMatch16.8.0cert11
OR
asteriskcertified_asteriskMatch16.8.0cert12
OR
asteriskcertified_asteriskMatch16.8.0cert2
OR
asteriskcertified_asteriskMatch16.8.0cert3
OR
asteriskcertified_asteriskMatch16.8.0cert4
OR
asteriskcertified_asteriskMatch16.8.0cert5
OR
asteriskcertified_asteriskMatch16.8.0cert6
OR
asteriskcertified_asteriskMatch16.8.0cert7
OR
asteriskcertified_asteriskMatch16.8.0cert8
OR
asteriskcertified_asteriskMatch16.8.0cert9
OR
sangomaasteriskRange16.0.016.24.1
OR
sangomaasteriskRange18.0.018.10.1
OR
sangomaasteriskRange19.0.019.2.1
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
VendorProductVersionCPE
teluupjsip*cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*
asteriskcertified_asterisk*cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*
asteriskcertified_asterisk16.8.0cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*
Rows per page:
1-10 of 171

CNA Affected

[
  {
    "vendor": "pjsip",
    "product": "pjproject",
    "versions": [
      {
        "version": "<= 2.11.1",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.012

Percentile

85.4%