Vulnerability Description
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Teluu | Pjsip | <= 2.11.1 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab9858PatchThird Party Advisory
- https://github.com/pjsip/pjproject/pull/2924ExploitIssue TrackingPatch
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hhPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/03/msg00035.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/11/msg00021.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
- https://security.gentoo.org/glsa/202210-37Third Party Advisory
- https://www.debian.org/security/2022/dsa-5285Third Party Advisory
- https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab9858PatchThird Party Advisory
- https://github.com/pjsip/pjproject/pull/2924ExploitIssue TrackingPatch
- https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hhPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/03/msg00035.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/11/msg00021.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html
FAQ
What is CVE-2021-43845?
CVE-2021-43845 is a vulnerability with a CVSS score of 8.2 (HIGH). PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size...
How severe is CVE-2021-43845?
CVE-2021-43845 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-43845?
Check the references section above for vendor advisories and patch information. Affected products include: Teluu Pjsip, Debian Debian Linux.