CVE-2021-21375
- EPSS 2.31%
- Veröffentlicht 10.03.2021 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:48:13
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when tw...
CVE-2020-15260
- EPSS 0.19%
- Veröffentlicht 10.03.2021 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:13
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.10 and earlier, PJSIP transport can be reused if they have the same ...
CVE-2018-1000099
- EPSS 0.97%
- Veröffentlicht 13.03.2018 01:29:01
- Zuletzt bearbeitet 21.11.2024 03:39:38
Teluu PJSIP version 2.7.1 and earlier contains a Access of Null/Uninitialized Pointer vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appe...
CVE-2018-1000098
- EPSS 0.7%
- Veröffentlicht 13.03.2018 01:29:01
- Zuletzt bearbeitet 21.11.2024 03:39:38
Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fix...
CVE-2017-16875
- EPSS 0.53%
- Veröffentlicht 17.11.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue a double key unregistration after an attacker initiates a socket connection with specific settings and sequences. Such double key...
CVE-2017-16872
- EPSS 0.87%
- Veröffentlicht 17.11.2017 09:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be capture...