{"id":"CVE-2022-23537","summary":"PJSIP vulnerable to heap buffer overflow when decoding STUN message","details":"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).","aliases":["GHSA-9pfh-r8x4-w26w"],"modified":"2026-04-10T15:38:02.885888Z","published":"2022-12-20T18:50:45.398Z","database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-122"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23537.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23537.json"},{"type":"ADVISORY","url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23537"},{"type":"FIX","url":"https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pjsip/pjproject","events":[{"introduced":"0"},{"fixed":"bb2287b3a85b17cd60bada94bb91319fb2926e8e"},{"fixed":"d8440f4d711a654b511f50f79c0445b26f9dd1e1"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.13.1"}]}}],"versions":["2.10","2.11","2.12","2.13"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23537.json","vanir_signatures":[{"signature_type":"Line","deprecated":false,"target":{"file":"pjnath/src/pjnath/stun_msg.c"},"source":"https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1","digest":{"threshold":0.9,"line_hashes":["18612373504463073740551882741285881240","3526038192533556141908007243088222330","29496267733341923012204971836591367172","200816988095274033813607907206466738681","55566425274604986895195173995850783681","327433874433756686875573150801924071718","47351983038507682535199811093509961146","155223481740359925410906844542991013043","50528738761833049235412847084486244515","248390355404224580366227446922295053780","128831361583486329360401550143339413193","153160359426839310476425346267911008507","181707070127127583847906513925823231656","106492156096976767712015664674545975610","119859183527595166558653165379619392541"]},"id":"CVE-2022-23537-6cc0fdc8","signature_version":"v1"},{"signature_type":"Line","deprecated":false,"target":{"file":"pjnath/include/pjnath/stun_msg.h"},"source":"https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1","digest":{"threshold":0.9,"line_hashes":["88132389918544031065297819323602215623","145421509306074939541719845636317010647","298598661041313342067275080448717786380","11611878063353058062696192433001720793","168636601345598575659546885564794633325","156298431545108291246711565227120156598","288120582573810449990841114779702970161","118673503331002261279157810817829637924","186323672926818288473840677908643138846","248517565612572658851601056321980321520","88575811129159014361359214641336831530"]},"id":"CVE-2022-23537-8af71348","signature_version":"v1"},{"signature_type":"Function","deprecated":false,"target":{"file":"pjnath/src/pjnath/stun_msg.c","function":"pj_stun_msg_decode"},"source":"https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1","digest":{"function_hash":"121968314982057448161055136182616858716","length":4191},"id":"CVE-2022-23537-bfd6e91a","signature_version":"v1"}],"vanir_signatures_modified":"2026-04-10T15:38:02Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}]}