An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
{
"binaries": [
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpj2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjlib-util2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjmedia-audiodev2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjmedia-codec2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjmedia-videodev2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjmedia2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjnath2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjproject-dev"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjsip-simple2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjsip-ua2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjsip2"
},
{
"binary_version": "2.1.0.0.ast20130823-1+deb8u1build0.16.04.1",
"binary_name": "libpjsua2"
}
]
}