{"id":"CVE-2022-21723","summary":"Out-of-bounds read in multipart parsing in PJSIP","details":"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.","aliases":["GHSA-7fw8-54cv-r7pm"],"modified":"2026-04-11T18:45:01.070114Z","published":"2022-01-27T00:00:00Z","database_specific":{"cwe_ids":["CWE-125"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/21xxx/CVE-2022-21723.json"},"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/21xxx/CVE-2022-21723.json"},{"type":"ADVISORY","url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21723"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202210-37"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5285"},{"type":"FIX","url":"https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896"},{"type":"ARTICLE","url":"http://seclists.org/fulldisclosure/2022/Mar/2"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/asterisk/asterisk","events":[{"introduced":"0"},{"last_affected":"d436f568583184a13aa46349af5a3f0907087b44"},{"introduced":"a65908f83e2f17a3aca7eb39c8e06045aca02674"},{"fixed":"c28961a7d88cf065f693d1ea412c3e2b35e6d18e"},{"introduced":"2c1bba3cbec008c8ce35c78a2c79f9f207ea58bc"},{"fixed":"4cf4f5f7076125bc649727540de5922c21e0558f"},{"introduced":"de4f63b4824c91a0cd9f3d95f3b7923bec71960c"},{"fixed":"7eb4edc725d6fa6877d88129d7bf99c0a1604de9"},{"introduced":"0"},{"last_affected":"847f753c4eda5891c4fe77dd7d0341381cb84975"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"16.8.0"},{"introduced":"16.0.0"},{"fixed":"16.24.1"},{"introduced":"18.0.0"},{"fixed":"18.10.1"},{"introduced":"19.0.0"},{"fixed":"19.2.1"},{"introduced":"0"},{"last_affected":"10.0"}]}}],"versions":["10.0.0","10.0.0-rc1","10.0.0-rc2","10.0.0-rc3","16.24.0","16.24.0-rc1","16.8.0","16.8.0-rc1","16.8.0-rc2","18.10.0","18.10.0-rc1","19.2.0","19.2.0-rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-21723.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/pjsip/pjproject","events":[{"introduced":"0"},{"fixed":"077b465c33f0aec05a49cd2ca456f9a1b112e896"}]}],"versions":["2.10","2.11"],"database_specific":{"vanir_signatures_modified":"2026-04-11T18:45:01Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-21723.json","vanir_signatures":[{"digest":{"function_hash":"54029846215899427546026137927943366750","length":228},"deprecated":false,"source":"https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896","signature_version":"v1","signature_type":"Function","target":{"function":"pj_scan_get_char","file":"pjlib-util/src/pjlib-util/scanner.c"},"id":"CVE-2022-21723-878201a0"},{"digest":{"threshold":0.9,"line_hashes":["21257971068237111781312071187184869574","233250210414147396740430857046717289995","23279858301796271446123949414617557610","120513516281041415767505558055386818794","249301324419667515767106270948162594119","154319877163992225251515697916520936624","20108604090800465742998138800067690626","304853177782123302844709029147041279813","295024220067829681274778255276677041068","271855231496254846833924321693337767818"]},"deprecated":false,"source":"https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896","signature_version":"v1","signature_type":"Line","target":{"file":"pjlib-util/src/pjlib-util/scanner.c"},"id":"CVE-2022-21723-bf2ce579"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}