Vulnerability Details : CVE-2021-43804
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
Products affected by CVE-2021-43804
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-43804
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-43804
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
7.3
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
3.9
|
3.4
|
NIST | |
7.3
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
3.9
|
3.4
|
GitHub, Inc. |
CWE ids for CVE-2021-43804
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Primary)
References for CVE-2021-43804
-
https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
Merge pull request from GHSA-3qx3-cg72-wrh9 · pjsip/pjproject@8b621f1 · GitHubPatch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
[SECURITY] [DLA 3549-1] ring security update
-
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
[SECURITY] [DLA 3194-1] asterisk security updateMailing List;Third Party Advisory
-
https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
Potential out-of-bounds read when parsing RTCP BYE message · Advisory · pjsip/pjproject · GitHubPatch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
[SECURITY] [DLA 2962-1] pjproject security updateMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202210-37
PJSIP: Multiple Vulnerabilities (GLSA 202210-37) — Gentoo securityThird Party Advisory
-
https://www.debian.org/security/2022/dsa-5285
Debian -- Security Information -- DSA-5285-1 asteriskThird Party Advisory
Jump to