CVE-2022-24754

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24754
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24754.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24754
Aliases
  • GHSA-73f7-48m9-w662
Downstream
Published
2022-03-11T00:00:00Z
Modified
2025-10-14T19:13:31.584853Z
Severity
  • 8.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Buffer overflow in pjsip
Details

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type PJSIP_CRED_DATA_DIGEST). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to PJSIP_MD5STRLEN before passing to PJSIP.

References

Affected packages

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*

2.10
2.11
2.12