Impact
The vulnerability in PJSIP 2.16 and earlier allows an attacker to trigger an out‑of‑bounds read when parsing a malformed Content‑ID URI in a SIP multipart message body. The insufficient length validation causes the library to read beyond the intended buffer, exposing internal memory contents. This weakness corresponds to CWE‑125 and can lead to sensitive data leakage.
Affected Systems
PJproject (PJSIP) versions up to 2.16 are affected. The issue was remedied in release 2.17. Any deployment using PJSIP 2.16 or earlier without an update is susceptible.
Risk and Exploitability
The CVSS score of 6.7 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require delivery of a crafted SIP multipart message, likely over the network. Once triggered, the read could expose memory contents to the attacker, limited to a memory disclosure scenario without evidence of further exploitation.
OpenCVE Enrichment