First published: Wed Feb 16 2022(Updated: )
Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.
Credit: reefs@jfrog.com reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-43302.
The severity of CVE-2021-43302 is critical with a severity value of 9.1.
The software affected by CVE-2021-43302 includes Teluu Pjsip (up to version 2.11.1), Debian Linux 9.0, Debian Linux 10.0, Debian Linux 11.0, and Ubuntu Ring (versions up to 20180228.1.503 and 20190215.1.).
CVE-2021-43302 can allow an attacker-controlled filename to cause an out-of-bounds read, leading to potential information disclosure or denial of service.
To fix CVE-2021-43302, users should update to the recommended patches or versions provided by the software vendors.