|Description||PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)|
|References||DLA-3036-1, DLA-3194-1, DSA-5285-1|
Vulnerable and fixed packages
The table below lists information on source packages.
|bullseye (security), bullseye||1:16.28.0~dfsg-0+deb11u2||fixed|
The information below is based on the following data on fixed versions.
[stretch] - asterisk <not-affected> (Vulnerable code not present)
code is present in ring but ring only uses the pjsip code, not pjmedia
should only affect 32bit builds.