CVE-2022-23608
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-23608 is a vulnerability discovered in PJSIP (PJPROJECT), a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. The vulnerability was disclosed in February 2022 and affects versions up to and including 2.11.1. The issue involves a dialog set scenario where a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed (GitHub Advisory).

Technical details

The vulnerability occurs when in a dialog set (or forking) scenario, where a hash key shared by multiple UAC dialogs can be prematurely freed when one of the dialogs is destroyed. This causes a dialog set to be registered in the hash table multiple times with different hash keys, leading to undefined behavior such as dialog list collision which eventually results in an endless loop. The vulnerability has been assigned a CVSS 3.1 base score of 9.8 (Critical) with attack vector: Network, attack complexity: Low, privileges required: None, user interaction: None, scope: Unchanged, and impact levels (confidentiality, integrity, availability) all rated as High (Ubuntu Security).

Impact

The vulnerability can lead to undefined behavior in the system, including dialog list collisions and endless loops. Being a use-after-free vulnerability, it affects all PJSIP users and could potentially lead to system crashes or denial of service conditions (GitHub Advisory).

Mitigation and workarounds

A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which was included in version 2.12 and later releases. Users are recommended to upgrade to PJSIP version 2.12.1 or later to address this vulnerability. There are no known workarounds for this issue (GitHub Advisory, Gentoo Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management