Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2962-1 pjproject security update
Debian DLA Debian DLA DLA-3194-1 asterisk security update
Debian DLA Debian DLA DLA-3549-1 ring security update
Debian DLA Debian DLA DLA-3887-1 ring security update
Debian DSA Debian DSA DSA-5285-1 asterisk security update
EUVD EUVD EUVD-2021-30244 Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
Ubuntu USN Ubuntu USN USN-6422-1 Ring vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2025-11-04T16:09:21.847Z

Reserved: 2021-11-03T00:00:00.000Z

Link: CVE-2021-43301

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-16T21:15:07.813

Modified: 2025-11-04T16:15:44.943

Link: CVE-2021-43301

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.