First published: Wed Dec 22 2021(Updated: )
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43804 is a vulnerability in the PJSIP multimedia communication library that allows remote attackers to cause a denial of service (DoS) by sending a specially crafted RTCP BYE message.
CVE-2021-43804 has a severity rating of 7.3, which is considered high.
The affected software versions include Teluu Pjsip up to version 2.11.1, Debian Debian Linux version 9.0 and 10.0, and Asterisk version up to 1:16.2.1~dfsg-1+deb10u2.
To fix CVE-2021-43804, update to the latest version of PJSIP, Debian Linux, or Asterisk, depending on your affected software.
Yes, you can find additional information about CVE-2021-43804 in the provided references.