CVE-2021-43303
16.02.2022, 21:15
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
Vendor | Product | Version |
---|---|---|
teluu | pjsip | 𝑥 ≤ 2.11.1 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
asterisk |
| ||||||||||
ring |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
asterisk |
| ||||||||||||||||||||
pjproject |
| ||||||||||||||||||||
ring |
|
References