CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
89.6%
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victimβs network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victimβs machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
Vendor | Product | Version | CPE |
---|---|---|---|
teluu | pjsip | * | cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* |
asterisk | certified_asterisk | * | cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:*:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:* |
asterisk | certified_asterisk | 16.8.0 | cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:* |
packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
seclists.org/fulldisclosure/2022/Mar/0
github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
lists.debian.org/debian-lts-announce/2022/03/msg00035.html
lists.debian.org/debian-lts-announce/2022/11/msg00021.html
lists.debian.org/debian-lts-announce/2023/08/msg00038.html
security.gentoo.org/glsa/202210-37
www.debian.org/security/2022/dsa-5285
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
89.6%