{"id":"CVE-2022-23547","summary":"Heap buffer overflow in pjproject when decoding STUN message","details":"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch.","modified":"2026-04-11T22:13:39.770995Z","published":"2022-12-23T14:00:22.817Z","related":["GHSA-9pfh-r8x4-w26w","GHSA-cxwq-5g9x-x7fr"],"database_specific":{"cwe_ids":["CWE-122"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23547.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23547.json"},{"type":"ADVISORY","url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w"},{"type":"ADVISORY","url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23547"},{"type":"FIX","url":"https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pjsip/pjproject","events":[{"introduced":"0"},{"fixed":"bc4812d31a67d5e2f973fbfaf950d6118226cf36"}]}],"versions":["2.10","2.11","2.12","2.13"],"database_specific":{"vanir_signatures":[{"target":{"file":"pjnath/src/pjnath/stun_msg.c"},"signature_type":"Line","id":"CVE-2022-23547-462989db","signature_version":"v1","source":"https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36","digest":{"threshold":0.9,"line_hashes":["175111722729723703917827652970951862848","320750873941837248162976296174686428233","10233014435274902338788707574033039708","137744306711955242229758531546220777278","249654785954974903787269973337509447243","5110287606641809158553059296723021022","173519180620720904105903041928057715721","160072966660618222001334444606641743879","286375471227338908900759340395951320869","243908081097029261488165077874505280886","48803634840579995942952949560625686557","228146071902379120397005005936558625401","288987876724974548673924177761914423157","143939636023947953045413134917839193746"]},"deprecated":false},{"target":{"file":"pjnath/src/pjnath/stun_msg.c","function":"decode_errcode_attr"},"signature_type":"Function","id":"CVE-2022-23547-8270a588","signature_version":"v1","source":"https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36","digest":{"function_hash":"130888148930563368781015239556470159847","length":491},"deprecated":false},{"target":{"file":"pjnath/src/pjnath/stun_msg.c","function":"decode_uint_attr"},"signature_type":"Function","id":"CVE-2022-23547-e3b73a4d","signature_version":"v1","source":"https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36","digest":{"function_hash":"336891827683311436262775604520492590857","length":350},"deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23547.json","vanir_signatures_modified":"2026-04-11T22:13:39Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}]}