CVE-2022-31031

Source
https://cve.org/CVERecord?id=CVE-2022-31031
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31031.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-31031
Aliases
  • GHSA-26j7-ww69-c4qj
Downstream
Published
2022-06-07T00:00:00Z
Modified
2026-05-15T11:54:28.194469590Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Potential stack buffer overflow when parsing message as a STUN client
Details

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using pjlib-util/stun_simple API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.

Database specific
{
    "cwe_ids": [
        "CWE-120"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31031.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages