CVE-2017-16872

NameCVE-2017-16872
DescriptionAn issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4170-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pjproject (PTS)jessie, jessie (lts)2.1.0.0.ast20130823-1+deb8u1vulnerable
stretch (security)2.5.5~dfsg-6+deb9u5fixed
stretch (lts), stretch2.5.5~dfsg-6+deb9u9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pjprojectsourcestretch2.5.5~dfsg-6+deb9u1DSA-4170-1
pjprojectsource(unstable)2.7.1~dfsg-1

Notes

[jessie] - pjproject <ignored> (Minor issue)
https://trac.pjsip.org/repos/ticket/2056
https://trac.pjsip.org/repos/changeset/5682
In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN)

Search for package or bug name: Reporting problems