CVE-2022-21723

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-21723
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-21723.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-21723
Aliases
  • GHSA-7fw8-54cv-r7pm
Downstream
Published
2022-01-27T00:00:00Z
Modified
2025-10-22T19:07:01.551296Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
Out-of-bounds read in multipart parsing in PJSIP
Details

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the master branch. There are no known workarounds.

Database specific
{
    "cwe_ids": [
        "CWE-125"
    ]
}
References

Affected packages

Git / github.com/asterisk/asterisk

Affected ranges

Type
GIT
Repo
https://github.com/asterisk/asterisk
Events

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.10
2.11

Database specific

vanir_signatures

[
    {
        "source": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896",
        "id": "CVE-2022-21723-878201a0",
        "deprecated": false,
        "target": {
            "function": "pj_scan_get_char",
            "file": "pjlib-util/src/pjlib-util/scanner.c"
        },
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 228.0,
            "function_hash": "54029846215899427546026137927943366750"
        }
    },
    {
        "source": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896",
        "id": "CVE-2022-21723-bf2ce579",
        "deprecated": false,
        "target": {
            "file": "pjlib-util/src/pjlib-util/scanner.c"
        },
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "21257971068237111781312071187184869574",
                "233250210414147396740430857046717289995",
                "23279858301796271446123949414617557610",
                "120513516281041415767505558055386818794",
                "249301324419667515767106270948162594119",
                "154319877163992225251515697916520936624",
                "20108604090800465742998138800067690626",
                "304853177782123302844709029147041279813",
                "295024220067829681274778255276677041068",
                "271855231496254846833924321693337767818"
            ]
        }
    }
]