
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2022-23608 is a vulnerability discovered in PJSIP (PJPROJECT), a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. The vulnerability was disclosed in February 2022 and affects versions up to and including 2.11.1. The issue involves a dialog set scenario where a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed (GitHub Advisory).
The vulnerability occurs when in a dialog set (or forking) scenario, where a hash key shared by multiple UAC dialogs can be prematurely freed when one of the dialogs is destroyed. This causes a dialog set to be registered in the hash table multiple times with different hash keys, leading to undefined behavior such as dialog list collision which eventually results in an endless loop. The vulnerability has been assigned a CVSS 3.1 base score of 9.8 (Critical) with attack vector: Network, attack complexity: Low, privileges required: None, user interaction: None, scope: Unchanged, and impact levels (confidentiality, integrity, availability) all rated as High (Ubuntu Security).
The vulnerability can lead to undefined behavior in the system, including dialog list collisions and endless loops. Being a use-after-free vulnerability, it affects all PJSIP users and could potentially lead to system crashes or denial of service conditions (GitHub Advisory).
A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which was included in version 2.12 and later releases. Users are recommended to upgrade to PJSIP version 2.12.1 or later to address this vulnerability. There are no known workarounds for this issue (GitHub Advisory, Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”