CVE-2026-26967

Source
https://cve.org/CVERecord?id=CVE-2026-26967
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26967.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26967
Aliases
  • GHSA-x2hc-6969-g8v6
Downstream
Published
2026-02-20T00:26:54.397Z
Modified
2026-02-22T00:39:09.970584Z
Severity
  • 8.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
PJSIP has a Heap-based Buffer Overflow vulnerability in its H.264 unpacketizer
Details

PJSIP is a free and open source multimedia communication library written in C. In versions 2.16 and below, there is a critical Heap-based Buffer Overflow vulnerability in PJSIP's H.264 unpacketizer. The bug occurs when processing malformed SRTP packets, where the unpacketizer reads a 2-byte NAL unit size field without validating that both bytes are within the payload buffer bounds. The vulnerability affects applications that receive video using H.264. A patch is available at https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26967.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-122"
    ]
}
References

Affected packages

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*
2.10
2.11
2.12
2.13
2.14
2.15
2.16

Database specific

vanir_signatures
[
    {
        "id": "CVE-2026-26967-6c6abe9b",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491",
        "target": {
            "function": "pjmedia_h264_unpacketize",
            "file": "pjmedia/src/pjmedia-codec/h264_packetizer.c"
        },
        "digest": {
            "length": 3509.0,
            "function_hash": "174921199561578382857004597551213349124"
        },
        "signature_type": "Function"
    },
    {
        "id": "CVE-2026-26967-fffb1e22",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491",
        "target": {
            "file": "pjmedia/src/pjmedia-codec/h264_packetizer.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "174508775060688208186196933156386257496",
                "269120899693158134564375044710920344784",
                "15752697100210992036560622550029801042",
                "207095924632289926696655095349060998272"
            ]
        },
        "signature_type": "Line"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26967.json"