First published: Mon Dec 27 2021(Updated: )
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <=2.11.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/asterisk | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 | |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1 | 20190215.1.f152c98~ds1-1+deb10u2 20230206.0~ds2-1.1 20231201.0~ds1-1 |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
<=2.11.1 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43845 is a vulnerability in the PJSIP multimedia communication library that allows for potential out-of-bound read access.
CVE-2021-43845 affects all users that use PJMEDIA and have incoming RTCP XR messages with a block that is not checked against the received packet size.
CVE-2021-43845 has a severity rating of 9.1 (critical).
To fix CVE-2021-43845, users should update to a version of PJSIP that includes the patch provided by the PJSIP project.
More information about CVE-2021-43845 can be found in the references provided by the PJSIP project.