CVE-2022-24754

Source
https://cve.org/CVERecord?id=CVE-2022-24754
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24754.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-24754
Aliases
  • GHSA-73f7-48m9-w662
Downstream
Published
2022-03-11T00:00:00Z
Modified
2026-02-05T06:34:14.366133Z
Severity
  • 8.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Buffer overflow in pjsip
Details

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type PJSIP_CRED_DATA_DIGEST). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to PJSIP_MD5STRLEN before passing to PJSIP.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24754.json",
    "cwe_ids": [
        "CWE-120"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24754.json"