Home

Description

PJSIP is a free and open source multimedia communication library written in C. In versions 2.16 and below, there is a critical Heap-based Buffer Overflow vulnerability in PJSIP's H.264 unpacketizer. The bug occurs when processing malformed SRTP packets, where the unpacketizer reads a 2-byte NAL unit size field without validating that both bytes are within the payload buffer bounds. The vulnerability affects applications that receive video using H.264. A patch is available at https://github.com/pjsip/pjproject/commit/f821c214e52b11bae11e4cd3c7f0864538fb5491.

PUBLISHED Reserved 2026-02-16 | Published 2026-02-20 | Updated 2026-02-20 | Assigner GitHub_M




HIGH: 8.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

< f821c214e52b11bae11e4cd3c7f0864538fb5491
affected

References

github.com/...roject/security/advisories/GHSA-x2hc-6969-g8v6

github.com/...ommit/f821c214e52b11bae11e4cd3c7f0864538fb5491

cve.org (CVE-2026-26967)

nvd.nist.gov (CVE-2026-26967)

Download JSON