CVE-2026-41415

PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, there is an out-of-bounds read when parsing a malformed Content-ID URI in SIP multipart message body. Insufficient length validation can cause reads beyond the intended buffer bounds. This vulnerability is fixed in 2.17.
Configurations

Configuration 1 (hide)

cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*

History

28 Apr 2026, 18:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CPE cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*
First Time Teluu pjsip
Teluu
References () https://github.com/pjsip/pjproject/commit/4225a93c16661538005017883fbc8f1ea1d5f4b0 - () https://github.com/pjsip/pjproject/commit/4225a93c16661538005017883fbc8f1ea1d5f4b0 - Patch
References () https://github.com/pjsip/pjproject/security/advisories/GHSA-935m-fmf5-j4pm - () https://github.com/pjsip/pjproject/security/advisories/GHSA-935m-fmf5-j4pm - Patch, Vendor Advisory

24 Apr 2026, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 19:17

Updated : 2026-04-28 18:30


NVD link : CVE-2026-41415

Mitre link : CVE-2026-41415

CVE.ORG link : CVE-2026-41415


JSON object : View

Products Affected

teluu

  • pjsip
CWE
CWE-125

Out-of-bounds Read