Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2021.0337
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2021-0337)
Zusammenfassung:The remote host is missing an update for the 'pjproject' package(s) announced via the MGASA-2021-0337 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'pjproject' package(s) announced via the MGASA-2021-0337 advisory.

Vulnerability Insight:
Currently, PJSIP transport can be reused if they have the same IP address
+ port + protocol. However, this is insufficient for secure transport since
it lacks remote hostname authentication. The vulnerability allows for an
insecure interaction without user awareness. It affects users who need access
to connections to different destinations that translate to the same address,
and allows man-in-the-middle attack if attacker can route a connection to
another destination such as in the case of DNS spoofing (CVE-2020-15260).

An issue has been found in pjproject. Due to bad handling of two consecutive
crafted answers to an INVITE, the attacker is able to crash the server
resulting in a denial of service (CVE-2021-21375).

Affected Software/OS:
'pjproject' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-15260
https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph
https://security.gentoo.org/glsa/202107-42
https://github.com/pjsip/pjproject/commit/67e46c1ac45ad784db5b9080f5ed8b133c122872
https://github.com/pjsip/pjproject/pull/2663
Common Vulnerability Exposure (CVE) ID: CVE-2021-21375
https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp
https://github.com/pjsip/pjproject/commit/97b3d7addbaa720b7ddb0af9bf6f3e443e664365
https://lists.debian.org/debian-lts-announce/2021/04/msg00023.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00020.html
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.