CVE-2021-43303

Name
CVE-2021-43303
Description
Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
MLIST https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
Mailing List https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reefs@jfrog.com https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Third Party Advisory https://www.debian.org/security/2022/dsa-5285
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* pjsip >= None <= 2.11.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
pjproject edge-main 2.12-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
pjproject 3.22-main 2.12-r0 None fixed
pjproject 3.21-main 2.12-r0 None fixed
pjproject 3.20-main 2.12-r0 None fixed
pjproject 3.19-main 2.12-r0 None fixed
pjproject 3.18-main 2.12-r0 None fixed
pjproject 3.17-main 2.12-r0 None fixed