PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, there is an out-of-bounds read when parsing a malformed Content-ID URI in SIP multipart message body. Insufficient length validation can cause reads beyond the intended buffer bounds. This vulnerability is fixed in 2.17.
References
| Link | Resource |
|---|---|
| https://github.com/pjsip/pjproject/commit/4225a93c16661538005017883fbc8f1ea1d5f4b0 | Patch |
| https://github.com/pjsip/pjproject/security/advisories/GHSA-935m-fmf5-j4pm | Patch Vendor Advisory |
Configurations
History
28 Apr 2026, 18:30
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| CPE | cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* | |
| First Time |
Teluu pjsip
Teluu |
|
| References | () https://github.com/pjsip/pjproject/commit/4225a93c16661538005017883fbc8f1ea1d5f4b0 - Patch | |
| References | () https://github.com/pjsip/pjproject/security/advisories/GHSA-935m-fmf5-j4pm - Patch, Vendor Advisory |
24 Apr 2026, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-24 19:17
Updated : 2026-04-28 18:30
NVD link : CVE-2026-41415
Mitre link : CVE-2026-41415
CVE.ORG link : CVE-2026-41415
JSON object : View
Products Affected
teluu
- pjsip
CWE
CWE-125
Out-of-bounds Read
