CVE-2025-49140 PUBLISHED

Pion Interceptor's improper RTP padding handling allows remote crash for SFU users (DoS)

Assigner: GitHub_M
Reserved: 02.06.2025 Published: 09.06.2025 Updated: 10.06.2025

Pion Interceptor is a framework for building RTP/RTCP communication software. Versions v0.1.36 through v0.1.38 contain a bug in a RTP packet factory that can be exploited to trigger a panic with Pion based SFU via crafted RTP packets, This only affect users that use pion/interceptor. Users should upgrade to v0.1.39 or later, which validates that: padLen > 0 && padLen <= payloadLength and return error on overflow, avoiding panic. If upgrading is not possible, apply the patch from the pull request manually or drop packets whose P-bit is set but whose padLen is zero or larger than the remaining payload.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor pion
Product interceptor
Versions
  • Version >= 0.1.36, < 0.1.39 is affected

References

Problem Types

  • CWE-770: Allocation of Resources Without Limits or Throttling CWE