{"api_version":"1","generated_at":"2026-04-23T07:01:54+00:00","cve":"CVE-2022-21722","urls":{"html":"https://cve.report/CVE-2022-21722","api":"https://cve.report/api/cve/CVE-2022-21722.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-21722","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-21722"},"summary":{"title":"CVE-2022-21722","description":"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-01-27 00:15:00","updated_at":"2023-08-30 01:15:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html","name":"[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2962-1] pjproject security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202210-37","name":"GLSA-202210-37","refsource":"GENTOO","tags":[],"title":"PJSIP: Multiple Vulnerabilities (GLSA 202210-37) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a","name":"https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-m66q-q64c-hv36 · pjsip/pjproject@22af44e · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","name":"[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3549-1] ring security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5285","name":"DSA-5285","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5285-1 asterisk","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html","name":"[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3194-1] asterisk security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36","name":"https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36","refsource":"CONFIRM","tags":[],"title":"Potential out-of-bound read during RTP/RTCP parsing · Advisory · pjsip/pjproject · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-21722","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21722","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"21722","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"21722","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"21722","vulnerable":"1","versionEndIncluding":"2.11.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"teluu","cpe5":"pjsip","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-21722","qid":"179161","title":"Debian Security Update for pjproject (DLA 2962-1)"},{"cve":"CVE-2022-21722","qid":"181225","title":"Debian Security Update for asterisk (DLA 3194-1)"},{"cve":"CVE-2022-21722","qid":"181237","title":"Debian Security Update for asterisk (DSA 5285-1)"},{"cve":"CVE-2022-21722","qid":"182037","title":"Debian Security Update for ring (CVE-2022-21722)"},{"cve":"CVE-2022-21722","qid":"199817","title":"Ubuntu Security Notification for Ring Vulnerabilities (USN-6422-1)"},{"cve":"CVE-2022-21722","qid":"502231","title":"Alpine Linux Security Update for pjproject"},{"cve":"CVE-2022-21722","qid":"504292","title":"Alpine Linux Security Update for pjproject"},{"cve":"CVE-2022-21722","qid":"6000045","title":"Debian Security Update for ring (DLA 3549-1)"},{"cve":"CVE-2022-21722","qid":"710674","title":"Gentoo Linux PJSIP Multiple Vulnerabilities (GLSA 202210-37)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-21722","STATE":"PUBLIC","TITLE":"Potential out-of-bound read during RTP/RTCP parsing in PJSIP"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"pjproject","version":{"version_data":[{"version_value":"<= 2.11.1"}]}}]},"vendor_name":"pjsip"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-125: Out-of-bounds Read"}]}]},"references":{"reference_data":[{"name":"https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36","refsource":"CONFIRM","url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36"},{"name":"https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a","refsource":"MISC","url":"https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a"},{"refsource":"MLIST","name":"[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"},{"refsource":"GENTOO","name":"GLSA-202210-37","url":"https://security.gentoo.org/glsa/202210-37"},{"refsource":"MLIST","name":"[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"refsource":"DEBIAN","name":"DSA-5285","url":"https://www.debian.org/security/2022/dsa-5285"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"}]},"source":{"advisory":"GHSA-m66q-q64c-hv36","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-01-27 00:15:00","lastModifiedDate":"2023-08-30 01:15:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":6.4},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*","versionEndIncluding":"2.11.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"21722","Ordinal":"221403","Title":"CVE-2022-21722","CVE":"CVE-2022-21722","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"21722","Ordinal":"1","NoteData":"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.","Type":"Description","Title":null},{"CveYear":"2022","CveId":"21722","Ordinal":"2","NoteData":"2022-01-26","Type":"Other","Title":"Published"},{"CveYear":"2022","CveId":"21722","Ordinal":"3","NoteData":"2022-01-26","Type":"Other","Title":"Modified"}]}}}