CVE-2026-40892
Stack Buffer Overflow in PJSIP Auth Digest Handling
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pjsip | pjsip | to 2.17 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack buffer overflow in the PJSIP multimedia communication library, specifically in the function pjsip_auth_create_digest2(). It occurs when using pre-computed digest credentials (PJSIP_CRED_DATA_DIGEST). The function copies credential data based on a length value (cred_info->data.slen) without checking if this length exceeds the size of the fixed buffer (128 bytes). If the length is too large, it can overflow the buffer on the stack.
How can this vulnerability impact me? :
The stack buffer overflow can lead to serious security issues such as arbitrary code execution, application crashes, or denial of service. Because the overflow occurs on the stack, an attacker could potentially execute malicious code or disrupt the normal operation of the application using PJSIP.