No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjsip
Pjsip pjproject |
|
| Vendors & Products |
Pjsip
Pjsip pjproject |
Fri, 24 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, there is an out-of-bounds read when parsing a malformed Content-ID URI in SIP multipart message body. Insufficient length validation can cause reads beyond the intended buffer bounds. This vulnerability is fixed in 2.17. | |
| Title | PJSIP: SIP Multipart CID URI Length Underflow | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T19:58:40.628Z
Reserved: 2026-04-20T15:32:33.813Z
Link: CVE-2026-41415
Updated: 2026-04-24T19:58:36.890Z
Status : Undergoing Analysis
Published: 2026-04-24T19:17:13.170
Modified: 2026-04-27T18:57:20.293
Link: CVE-2026-41415
No data.
OpenCVE Enrichment
Updated: 2026-04-27T20:15:12Z