Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2962-1 pjproject security update
Debian DLA Debian DLA DLA-3194-1 asterisk security update
Debian DLA Debian DLA DLA-3549-1 ring security update
Debian DLA Debian DLA DLA-3887-1 ring security update
Debian DSA Debian DSA DSA-5285-1 asterisk security update
EUVD EUVD EUVD-2021-30246 Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
Ubuntu USN Ubuntu USN USN-6422-1 Ring vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-08-04T03:55:28.431Z

Reserved: 2021-11-03T00:00:00

Link: CVE-2021-43303

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-16T21:15:07.920

Modified: 2024-11-21T06:29:02.567

Link: CVE-2021-43303

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.