CVE-2022-23537

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23537
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23537.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-23537
Aliases
  • GHSA-9pfh-r8x4-w26w
Downstream
Published
2022-12-20T18:50:45Z
Modified
2025-11-06T06:11:11.720633Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H CVSS Calculator
Summary
PJSIP vulnerable to heap buffer overflow when decoding STUN message
Details

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).

Database specific
{
    "cwe_ids": [
        "CWE-122"
    ]
}
References

Affected packages

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.10
2.11
2.12
2.13

Database specific

vanir_signatures

[
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "18612373504463073740551882741285881240",
                "3526038192533556141908007243088222330",
                "29496267733341923012204971836591367172",
                "200816988095274033813607907206466738681",
                "55566425274604986895195173995850783681",
                "327433874433756686875573150801924071718",
                "47351983038507682535199811093509961146",
                "155223481740359925410906844542991013043",
                "50528738761833049235412847084486244515",
                "248390355404224580366227446922295053780",
                "128831361583486329360401550143339413193",
                "153160359426839310476425346267911008507",
                "181707070127127583847906513925823231656",
                "106492156096976767712015664674545975610",
                "119859183527595166558653165379619392541"
            ]
        },
        "source": "https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "pjnath/src/pjnath/stun_msg.c"
        },
        "signature_type": "Line",
        "id": "CVE-2022-23537-6cc0fdc8"
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "88132389918544031065297819323602215623",
                "145421509306074939541719845636317010647",
                "298598661041313342067275080448717786380",
                "11611878063353058062696192433001720793",
                "168636601345598575659546885564794633325",
                "156298431545108291246711565227120156598",
                "288120582573810449990841114779702970161",
                "118673503331002261279157810817829637924",
                "186323672926818288473840677908643138846",
                "248517565612572658851601056321980321520",
                "88575811129159014361359214641336831530"
            ]
        },
        "source": "https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "pjnath/include/pjnath/stun_msg.h"
        },
        "signature_type": "Line",
        "id": "CVE-2022-23537-8af71348"
    },
    {
        "digest": {
            "length": 4191.0,
            "function_hash": "121968314982057448161055136182616858716"
        },
        "source": "https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1",
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "pjnath/src/pjnath/stun_msg.c",
            "function": "pj_stun_msg_decode"
        },
        "signature_type": "Function",
        "id": "CVE-2022-23537-bfd6e91a"
    }
]