Name | CVE-2021-43845 |
Description | PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2962-1, DLA-3194-1, DLA-3549-1, DLA-3887-1, DSA-5285-1 |
Debian Bugs | 1014998 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
asterisk (PTS) | bullseye | 1:16.28.0~dfsg-0+deb11u4 | fixed |
bullseye (security) | 1:16.28.0~dfsg-0+deb11u5 | fixed | |
sid | 1:22.0.0~dfsg+~cs6.14.60671435-1 | fixed | |
ring (PTS) | bullseye | 20210112.2.b757bac~ds1-1 | vulnerable |
bullseye (security) | 20210112.2.b757bac~ds1-1+deb11u1 | fixed | |
bookworm | 20230206.0~ds2-1.1 | fixed | |
sid | 20231201.0~ds1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
asterisk | source | stretch | (not affected) | |||
asterisk | source | buster | 1:16.28.0~dfsg-0+deb10u1 | DLA-3194-1 | ||
asterisk | source | bullseye | 1:16.28.0~dfsg-0+deb11u1 | DSA-5285-1 | ||
asterisk | source | (unstable) | 1:18.12.0~dfsg+~cs6.12.40431413-1 | |||
pjproject | source | stretch | 2.5.5~dfsg-6+deb9u3 | DLA-2962-1 | ||
pjproject | source | (unstable) | (unfixed) | |||
ring | source | buster | 20190215.1.f152c98~ds1-1+deb10u2 | DLA-3549-1 | ||
ring | source | bullseye | 20210112.2.b757bac~ds1-1+deb11u1 | DLA-3887-1 | ||
ring | source | (unstable) | 20230206.0~ds1-1 | 1014998 |
[stretch] - asterisk <not-affected> (Vulnerable code not present)
https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
https://github.com/pjsip/pjproject/pull/2924