An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-4170-1 pjproject security update
EUVD EUVD EUVD-2017-8046 An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:35:21.318Z

Reserved: 2017-11-17T00:00:00

Link: CVE-2017-16872

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-11-17T09:29:00.387

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-16872

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses