Vulnerability identifier: #VU63100
Vulnerability risk: High
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-787
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
pjsip
Universal components / Libraries /
Libraries used by multiple products
Vendor: pjsip
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when parsing RTCP feedback RPSI (Reference Picture Selection Indication) packet. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
pjsip: 2.0 - 2.12
CPE
External links
http://github.com/pjsip/pjproject/security/advisories/GHSA-vhxv-phmx-g52q
http://github.com/pjsip/pjproject/commit/11559e49e65bdf00922ad5ae28913ec6a198d508
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?