PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using pjlib-util/stun_simple API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
{
"cwe_ids": [
"CWE-120"
]
}[
{
"digest": {
"line_hashes": [
"18675985838574001591672348400044795040",
"200545929341133339176492842925854951894",
"71345757283245926026788890123809048397",
"211798829883131747519432289994270918858",
"256546572321531786175823060796245495320",
"176674116864836577417796026252013864768",
"35219471761988995358705221229101182948",
"100676641146409153927902959964396058321",
"64010385457529374259348921871547858181",
"171761158291525197135947210639399377618",
"132419225607288865818083473479881875173",
"205008093233970311751219738864899309652"
],
"threshold": 0.9
},
"target": {
"file": "pjlib-util/src/pjlib-util/stun_simple.c"
},
"source": "https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202",
"id": "CVE-2022-31031-b211dd0b",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"digest": {
"length": 1569.0,
"function_hash": "105640829199272616322361861027215462711"
},
"target": {
"file": "pjlib-util/src/pjlib-util/stun_simple.c",
"function": "pjstun_parse_msg"
},
"source": "https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202",
"id": "CVE-2022-31031-d5d5e7ab",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
}
]