Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.892962
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-2962-1)
Summary:The remote host is missing an update for the Debian 'pjproject' package(s) announced via the DLA-2962-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'pjproject' package(s) announced via the DLA-2962-1 advisory.

Vulnerability Insight:
Multiple security issues were discovered in pjproject, is a free and open source multimedia communication library.

CVE-2021-32686

A race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. s. They cause crash, resulting in a denial of service.

CVE-2021-37706

An incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim's network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim's machine

CVE-2021-41141

In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users.

CVE-2021-43299

Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled filename argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

CVE-2021-43300

Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled filename argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

CVE-2021-43301

Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled file_names argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

CVE-2021-43302

Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled filename argument may cause an out-of-bounds read when the filename is shorter than 4 characters.

CVE-2021-43303

Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled buffer argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the maxlen argument supplied

CVE-2021-43804

An incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. A malicious actor can send a RTCP BYE message with an invalid reason length

CVE-2021-43845

if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access

CVE-2022-21722

it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP.

CVE-2022-21723

Parsing an incoming SIP message that contains a malformed ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'pjproject' package(s) on Debian 9.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-32686
https://github.com/pjsip/pjproject/security/advisories/GHSA-cv8x-p47p-99wr
Debian Security Information: DSA-4999 (Google Search)
https://www.debian.org/security/2021/dsa-4999
https://security.gentoo.org/glsa/202210-37
https://github.com/pjsip/pjproject/commit/d5f95aa066f878b0aef6a64e60b61e8626e664cd
https://github.com/pjsip/pjproject/pull/2716
https://github.com/pjsip/pjproject/releases/tag/2.11.1
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-37706
https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
Debian Security Information: DSA-5285 (Google Search)
https://www.debian.org/security/2022/dsa-5285
http://seclists.org/fulldisclosure/2022/Mar/0
http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-41141
https://github.com/pjsip/pjproject/security/advisories/GHSA-8fmx-hqw7-6gmc
https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
Common Vulnerability Exposure (CVE) ID: CVE-2021-43299
https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9
Common Vulnerability Exposure (CVE) ID: CVE-2021-43300
Common Vulnerability Exposure (CVE) ID: CVE-2021-43301
Common Vulnerability Exposure (CVE) ID: CVE-2021-43302
Common Vulnerability Exposure (CVE) ID: CVE-2021-43303
Common Vulnerability Exposure (CVE) ID: CVE-2021-43804
https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9
https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e
Common Vulnerability Exposure (CVE) ID: CVE-2021-43845
https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh
https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859
https://github.com/pjsip/pjproject/pull/2924
Common Vulnerability Exposure (CVE) ID: CVE-2022-21722
https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
Common Vulnerability Exposure (CVE) ID: CVE-2022-21723
https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
http://seclists.org/fulldisclosure/2022/Mar/2
http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
Common Vulnerability Exposure (CVE) ID: CVE-2022-23608
https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
http://seclists.org/fulldisclosure/2022/Mar/1
http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-24754
https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
Common Vulnerability Exposure (CVE) ID: CVE-2022-24764
https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.