Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teluu
Teluu pjsip |
|
| CPEs | cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Teluu
Teluu pjsip |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 28 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 27 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjsip
Pjsip pjproject |
|
| Vendors & Products |
Pjsip
Pjsip pjproject |
Fri, 24 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, there is an out-of-bounds read when parsing a malformed Content-ID URI in SIP multipart message body. Insufficient length validation can cause reads beyond the intended buffer bounds. This vulnerability is fixed in 2.17. | |
| Title | PJSIP: SIP Multipart CID URI Length Underflow | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T19:58:40.628Z
Reserved: 2026-04-20T15:32:33.813Z
Link: CVE-2026-41415
Updated: 2026-04-24T19:58:36.890Z
Status : Analyzed
Published: 2026-04-24T19:17:13.170
Modified: 2026-04-28T18:30:54.843
Link: CVE-2026-41415
OpenCVE Enrichment
Updated: 2026-04-28T13:45:06Z