PJSIP is a free and open source multimedia communication library written in C. In versions 2.16 and below, there is a critical Heap-based Buffer Overflow vulnerability in PJSIP's H.264 unpacketizer. The bug occurs when processing malformed SRTP packets, where the unpacketizer reads a 2-byte NAL unit size field without validating that both bytes are within the payload buffer bounds. The vulnerability affects applications that receive video using H.264. A patch is available at https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491.
References
| Link | Resource |
|---|---|
| https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491 | Patch |
| https://github.com/pjsip/pjproject/security/advisories/GHSA-x2hc-6969-g8v6 | Patch Vendor Advisory |
Configurations
History
20 Feb 2026, 19:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491 - Patch | |
| References | () https://github.com/pjsip/pjproject/security/advisories/GHSA-x2hc-6969-g8v6 - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:pjsip:pjsip:*:*:*:*:*:*:*:* | |
| First Time |
Pjsip
Pjsip pjsip |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
20 Feb 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 01:15
Updated : 2026-02-20 19:30
NVD link : CVE-2026-26967
Mitre link : CVE-2026-26967
CVE.ORG link : CVE-2026-26967
JSON object : View
Products Affected
pjsip
- pjsip
CWE
CWE-122
Heap-based Buffer Overflow
