First published: Wed Feb 16 2022(Updated: )
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
Credit: reefs@jfrog.com reefs@jfrog.com reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43303 is a buffer overflow vulnerability in the PJSUA API when calling pjsua_call_dump.
The severity of CVE-2021-43303 is critical with a CVSS score of 9.8.
CVE-2021-43303 affects Teluu Pjsip versions up to 2.11.1 and Debian Linux 9.0, 10.0, and 11.0.
An attacker can exploit CVE-2021-43303 by supplying an output buffer smaller than 128 characters, causing a buffer overflow.
Yes, you can find more information about CVE-2021-43303 at the following references: [link 1](https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9), [link 2](https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html), [link 3](https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html).