PJSIP is a free and open source multimedia communication library written in
C language. In versions prior to and including 2.12 PJSIP there is a
stack-buffer overflow vulnerability which only impacts PJSIP users who
accept hashed digest credentials (credentials with data_type
PJSIP_CRED_DATA_DIGEST
). This issue has been patched in the master branch
of the PJSIP repository and will be included with the next release. Users
unable to upgrade need to check that the hashed digest data length must be
equal to PJSIP_MD5STRLEN
before passing to PJSIP.
github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
launchpad.net/bugs/cve/CVE-2022-24754
nvd.nist.gov/vuln/detail/CVE-2022-24754
security-tracker.debian.org/tracker/CVE-2022-24754
ubuntu.com/security/notices/USN-6422-1
www.cve.org/CVERecord?id=CVE-2022-24754