Critical severity9.8NVD Advisory· Published Nov 17, 2017· Updated May 13, 2026
CVE-2017-16872
CVE-2017-16872
Description
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
Affected products
2- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- trac.pjsip.org/repos/milestone/release-2.7.1nvdRelease NotesVendor Advisory
- trac.pjsip.org/repos/ticket/2056nvdVendor Advisory
- www.debian.org/security/2018/dsa-4170nvdThird Party Advisory
News mentions
0No linked articles in our index yet.