CVE-2021-43300

Name
CVE-2021-43300
Description
Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
MLIST https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
Mailing List https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reefs@jfrog.com https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Third Party Advisory https://www.debian.org/security/2022/dsa-5285
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* pjsip >= None <= 2.11.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
pjproject edge-main 2.12-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
pjproject 3.22-main 2.12-r0 None fixed
pjproject 3.21-main 2.12-r0 None fixed
pjproject 3.20-main 2.12-r0 None fixed
pjproject 3.19-main 2.12-r0 None fixed
pjproject 3.18-main 2.12-r0 None fixed
pjproject 3.17-main 2.12-r0 None fixed