PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2962-1 | pjproject security update |
Debian DLA |
DLA-3194-1 | asterisk security update |
Debian DLA |
DLA-3549-1 | ring security update |
Debian DLA |
DLA-3887-1 | ring security update |
Debian DSA |
DSA-5285-1 | asterisk security update |
EUVD |
EUVD-2021-24195 | PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds. |
Ubuntu USN |
USN-6422-1 | Ring vulnerabilities |
Ubuntu USN |
USN-6422-2 | Ring vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-04T16:09:17.025Z
Reserved: 2021-07-29T00:00:00.000Z
Link: CVE-2021-37706
No data.
Status : Modified
Published: 2021-12-22T18:15:07.487
Modified: 2025-11-04T16:15:43.010
Link: CVE-2021-37706
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN