Description
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
Published: 2021-12-22
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2962-1 pjproject security update
Debian DLA Debian DLA DLA-3194-1 asterisk security update
Debian DLA Debian DLA DLA-3549-1 ring security update
Debian DLA Debian DLA DLA-3887-1 ring security update
Debian DSA Debian DSA DSA-5285-1 asterisk security update
EUVD EUVD EUVD-2021-30695 PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
Ubuntu USN Ubuntu USN USN-6422-1 Ring vulnerabilities
History

Tue, 04 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-04T16:09:25.648Z

Reserved: 2021-11-16T00:00:00.000Z

Link: CVE-2021-43804

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-22T18:15:07.900

Modified: 2025-11-04T16:15:45.610

Link: CVE-2021-43804

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses