Vulnerability Details CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 52.1%
CVSS Severity
CVSS v3 Score 9.1
CVSS v2 Score 6.4
Products affected by CVE-2022-21723
-
cpe:2.3:a:asterisk:certified_asterisk:16.8.0
-
cpe:2.3:a:sangoma:asterisk:16.0.0
-
cpe:2.3:a:sangoma:asterisk:16.10.0
-
cpe:2.3:a:sangoma:asterisk:16.11.0
-
cpe:2.3:a:sangoma:asterisk:16.12.0
-
cpe:2.3:a:sangoma:asterisk:16.14.0
-
cpe:2.3:a:sangoma:asterisk:16.14.1
-
cpe:2.3:a:sangoma:asterisk:16.15.0
-
cpe:2.3:a:sangoma:asterisk:16.16.0
-
cpe:2.3:a:sangoma:asterisk:16.16.1
-
cpe:2.3:a:sangoma:asterisk:16.5.0
-
cpe:2.3:a:sangoma:asterisk:16.6.0
-
cpe:2.3:a:sangoma:asterisk:16.7.0
-
cpe:2.3:a:sangoma:asterisk:16.8.0
-
cpe:2.3:a:sangoma:asterisk:16.9.0
-
cpe:2.3:a:sangoma:asterisk:18.0.0
-
cpe:2.3:a:sangoma:asterisk:18.0.1
-
cpe:2.3:a:sangoma:asterisk:18.1.0
-
cpe:2.3:a:sangoma:asterisk:18.1.1
-
cpe:2.3:a:sangoma:asterisk:18.10.0
-
cpe:2.3:a:sangoma:asterisk:18.2.0
-
cpe:2.3:a:sangoma:asterisk:18.2.1
-
cpe:2.3:a:sangoma:asterisk:18.2.2
-
cpe:2.3:a:sangoma:asterisk:18.3.0
-
cpe:2.3:a:sangoma:asterisk:18.4.0
-
cpe:2.3:a:sangoma:asterisk:18.5.0
-
cpe:2.3:a:sangoma:asterisk:18.5.1
-
cpe:2.3:a:sangoma:asterisk:18.6.0
-
cpe:2.3:a:sangoma:asterisk:18.7.0
-
cpe:2.3:a:sangoma:asterisk:18.7.1
-
cpe:2.3:a:sangoma:asterisk:18.8.0
-
cpe:2.3:a:sangoma:asterisk:18.9.0
-
cpe:2.3:a:sangoma:asterisk:19.0.0
-
cpe:2.3:a:sangoma:asterisk:19.1.0
-
cpe:2.3:a:sangoma:asterisk:19.2.0
-
cpe:2.3:a:teluu:pjsip:0.5.0.1
-
cpe:2.3:a:teluu:pjsip:0.5.10
-
cpe:2.3:a:teluu:pjsip:0.5.10.1
-
cpe:2.3:a:teluu:pjsip:0.5.10.2
-
cpe:2.3:a:teluu:pjsip:0.5.10.3
-
cpe:2.3:a:teluu:pjsip:0.5.10.4
-
cpe:2.3:a:teluu:pjsip:0.5.2
-
cpe:2.3:a:teluu:pjsip:0.5.3
-
cpe:2.3:a:teluu:pjsip:0.5.4
-
cpe:2.3:a:teluu:pjsip:0.5.5.1
-
cpe:2.3:a:teluu:pjsip:0.5.6
-
cpe:2.3:a:teluu:pjsip:0.5.6.1
-
cpe:2.3:a:teluu:pjsip:0.5.7
-
cpe:2.3:a:teluu:pjsip:0.5.8
-
cpe:2.3:a:teluu:pjsip:0.5.9
-
cpe:2.3:a:teluu:pjsip:0.7.0
-
cpe:2.3:a:teluu:pjsip:0.8.0
-
cpe:2.3:a:teluu:pjsip:0.9.0
-
cpe:2.3:a:teluu:pjsip:1.0
-
cpe:2.3:a:teluu:pjsip:1.0.1
-
cpe:2.3:a:teluu:pjsip:1.0.2
-
cpe:2.3:a:teluu:pjsip:1.0.3
-
cpe:2.3:a:teluu:pjsip:1.1
-
cpe:2.3:a:teluu:pjsip:1.10
-
cpe:2.3:a:teluu:pjsip:1.12
-
cpe:2.3:a:teluu:pjsip:1.14
-
cpe:2.3:a:teluu:pjsip:1.14.2
-
cpe:2.3:a:teluu:pjsip:1.16
-
cpe:2.3:a:teluu:pjsip:1.2
-
cpe:2.3:a:teluu:pjsip:1.3
-
cpe:2.3:a:teluu:pjsip:1.4
-
cpe:2.3:a:teluu:pjsip:1.4.5
-
cpe:2.3:a:teluu:pjsip:1.5
-
cpe:2.3:a:teluu:pjsip:1.5.5
-
cpe:2.3:a:teluu:pjsip:1.6
-
cpe:2.3:a:teluu:pjsip:1.7
-
cpe:2.3:a:teluu:pjsip:1.8
-
cpe:2.3:a:teluu:pjsip:1.8.10
-
cpe:2.3:a:teluu:pjsip:1.8.5
-
cpe:2.3:a:teluu:pjsip:2.0
-
cpe:2.3:a:teluu:pjsip:2.0.1
-
cpe:2.3:a:teluu:pjsip:2.1
-
cpe:2.3:a:teluu:pjsip:2.10
-
cpe:2.3:a:teluu:pjsip:2.11
-
cpe:2.3:a:teluu:pjsip:2.11.1
-
cpe:2.3:a:teluu:pjsip:2.2
-
cpe:2.3:a:teluu:pjsip:2.2.1
-
cpe:2.3:a:teluu:pjsip:2.3
-
cpe:2.3:a:teluu:pjsip:2.4
-
cpe:2.3:a:teluu:pjsip:2.4.5
-
cpe:2.3:a:teluu:pjsip:2.5
-
cpe:2.3:a:teluu:pjsip:2.5.1
-
cpe:2.3:a:teluu:pjsip:2.5.5
-
cpe:2.3:a:teluu:pjsip:2.6
-
cpe:2.3:a:teluu:pjsip:2.7
-
cpe:2.3:a:teluu:pjsip:2.7.1
-
cpe:2.3:a:teluu:pjsip:2.7.2
-
cpe:2.3:a:teluu:pjsip:2.8
-
cpe:2.3:a:teluu:pjsip:2.9
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:9.0