CVE-2022-24786

Source
https://cve.org/CVERecord?id=CVE-2022-24786
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24786.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-24786
Aliases
  • GHSA-vhxv-phmx-g52q
Downstream
Published
2022-04-06T00:00:00Z
Modified
2026-02-09T04:43:30.488861Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Potential out-of-bound read/write in PJSIP
Details

PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmediartcpfbparserpsi() will be affected. A patch is available in the master branch of the pjsip/pjproject GitHub repository. There are currently no known workarounds.

Database specific
{
    "cwe_ids": [
        "CWE-125",
        "CWE-787"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24786.json"
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24786.json"