First published: Wed Feb 16 2022(Updated: )
Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
Credit: reefs@jfrog.com reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43299 is a vulnerability that allows a stack overflow in PJSUA API when calling pjsua_player_create.
CVE-2021-43299 has a severity rating of 9.8 (Critical).
CVE-2021-43299 affects Teluu Pjsip versions up to and including 2.11.1, as well as Debian Linux versions 9.0, 10.0, and 11.0.
CVE-2021-43299 occurs when an attacker-controlled 'filename' argument is passed to pjsua_player_create, causing a buffer overflow.
To fix CVE-2021-43299, update to the latest version of Teluu Pjsip or Debian Linux, depending on the affected software.