Impact
Prior to version 2.17 of the PJSIP multimedia communication library, the Opus codec parser in pjmedia-codec contains a stack buffer overflow when it processes an RTP payload that includes more frames than the caller reserved space for. This flaw can corrupt the stack, potentially leading to a denial‑of‑service condition. The vulnerability is identified as CWE‑120 and CWE‑121.
Affected Systems
Affects the open‑source PJSIP pjproject library, all releases earlier than 2.17. Systems that integrate PJSIP for VoIP, SIP, or multimedia handling are at risk if they process RTP streams containing crafted Opus frames.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.7, indicating high impact. The EPSS score is <1%, so exploitation is unlikely but possible. It is not listed in the CISA KEV catalog. The likely attack vector is remote via the network: an attacker who can send a spoofed RTP stream to the vulnerable system can trigger the overflow. Successful exploitation would only require a crafted payload and does not need local interaction with the target system.
OpenCVE Enrichment