First published: Wed Feb 16 2022(Updated: )
Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
Credit: reefs@jfrog.com reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43301 is a vulnerability in PJSUA API that allows an attacker-controlled 'file_names' argument to cause a buffer overflow.
Teluu Pjsip version 2.11.1, Debian Debian Linux 9.0 and 10.0, Ubuntu Ring versions up to 20180228.1.503 and 20190215.1., and Debian Asterisk versions up to 1:16.2.1~dfsg-1+deb10u2 are affected.
CVE-2021-43301 has a severity rating of 9.8, which is classified as critical.
Apply the recommended patches and updates provided by the software vendors to fix CVE-2021-43301.
You can find more information about CVE-2021-43301 in the PJSIP security advisories and Debian LTS announcements.