An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-11-17T09:00:00

Updated: 2018-04-11T09:57:01

Reserved: 2017-11-17T00:00:00


Link: CVE-2017-16872

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-11-17T09:29:00.387

Modified: 2021-09-02T14:49:21.800


Link: CVE-2017-16872

JSON object: View

cve-icon Redhat Information

No data.

CWE