First published: Wed Feb 16 2022(Updated: )
Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
Credit: reefs@jfrog.com reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43300 is a vulnerability in the PJSUA API that allows a stack overflow when calling pjsua_recorder_create, potentially leading to a buffer overflow.
Teluu Pjsip version up to and including 2.11.1, Debian Linux versions 9.0, 10.0, and 11.0, and the Ring package versions 20180228.1.503 and 20190215.1.
The severity of CVE-2021-43300 is critical with a CVSS score of 9.8.
Update Teluu Pjsip to version 2.11.2 or newer to fix CVE-2021-43300.
Update your Debian Linux distribution to the latest LTS version and apply the necessary security updates to fix CVE-2021-43300.
Update the Ring package to the latest version available that includes the fix for CVE-2021-43300.