Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 23 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjsip pjsip
|
|
| CPEs | cpe:2.3:a:pjsip:pjsip:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pjsip pjsip
|
|
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjsip
Pjsip pjproject |
|
| Vendors & Products |
Pjsip
Pjsip pjproject |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, a stack buffer overflow exists in pjsip_auth_create_digest2() in PJSIP when using pre-computed digest credentials (PJSIP_CRED_DATA_DIGEST). The function copies credential data using cred_info->data.slen as the length without an upper-bound check, which can overflow the fixed-size ha1 stack buffer (128 bytes) if data.slen exceeds the expected digest string length. | |
| Title | PJSIP: Stack buffer overflow in pjsip_auth_create_digest2() | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T20:27:29.133Z
Reserved: 2026-04-15T16:37:22.766Z
Link: CVE-2026-40892
Updated: 2026-04-21T20:27:25.592Z
Status : Analyzed
Published: 2026-04-21T21:16:44.153
Modified: 2026-04-23T16:07:18.487
Link: CVE-2026-40892
No data.
OpenCVE Enrichment
Updated: 2026-04-22T05:30:09Z