An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libpj2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjlib-util2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjmedia-audiodev2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjmedia-codec2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjmedia-videodev2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjmedia2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjnath2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjproject-dev",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjsip-simple2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjsip-ua2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjsip2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
},
{
"binary_name": "libpjsua2",
"binary_version": "2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1"
}
]
}