Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:223148
[Rus]
Version
1
Class
patch
ALTXid
449700
Language
English
Severity
Critical
Title
DLA-3549-1 -- ring security update
Description
Several issue have been found in ring/jami, a secure and distributed voice, video and chat platform.
Family
unix
Platform
Debian 10
Product
ring
Reference
VENDOR: DLA-3549-1
VENDOR: DLA-3549-1
Id:
DLA-3549-1
Reference:
https://lists.debian.org/debian-lts-announce/2023/debian-lts-announce-202308/msg00038.html
CVE: CVE-2021-37706
CVE: CVE-2021-37706
Id:
CVE-2021-37706
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
191 (Integer Underflow (Wrap or Wraparound))
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984 (CONFIRM)
https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865 (MISC)
20220304 AST-2022-004: pjproject: integer underflow on STUN message (FULLDISC)
http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2021-43299
CVE: CVE-2021-43299
Id:
CVE-2021-43299
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
Comment
: Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
121 (Stack-based Buffer Overflow)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2021-43300
CVE: CVE-2021-43300
Id:
CVE-2021-43300
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
Comment
: Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
121 (Stack-based Buffer Overflow)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2021-43301
CVE: CVE-2021-43301
Id:
CVE-2021-43301
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
Comment
: Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
121 (Stack-based Buffer Overflow)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2021-43302
CVE: CVE-2021-43302
Id:
CVE-2021-43302
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
Comment
: Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause an out-of-bounds read when the filename is shorter than 4 characters.
CVSSv2 Score:
6.4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSSv3 Score:
9.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2021-43303
CVE: CVE-2021-43303
Id:
CVE-2021-43303
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
Comment
: Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-qcvw-h34v-c7r9 (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2021-43804
CVE: CVE-2021-43804
Id:
CVE-2021-43804
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7.3
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
LOW
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-3qx3-cg72-wrh9 (CONFIRM)
https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2021-43845
CVE: CVE-2021-43845
Id:
CVE-2021-43845
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
Comment
: PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.
CVSSv2 Score:
6.4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSSv3 Score:
9.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859 (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-r374-qrwv-86hh (CONFIRM)
https://github.com/pjsip/pjproject/pull/2924 (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-21722
CVE: CVE-2022-21722
Id:
CVE-2022-21722
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.
CVSSv2 Score:
6.4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSSv3 Score:
9.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36 (CONFIRM)
https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-21723
CVE: CVE-2022-21723
Id:
CVE-2022-21723
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.
CVSSv2 Score:
6.4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSSv3 Score:
9.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm (CONFIRM)
https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896 (MISC)
20220304 AST-2022-006: pjproject: unconstrained malformed multipart SIP message (FULLDISC)
http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-23537
CVE: CVE-2022-23537
Id:
CVE-2022-23537
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
122 (Heap-based Buffer Overflow)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w (MISC)
https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1 (MISC)
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html (MISC)
CVE: CVE-2022-23547
CVE: CVE-2022-23547
Id:
CVE-2022-23547
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch.
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
122 (Heap-based Buffer Overflow)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr (MISC)
https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36 (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w (MISC)
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html (MISC)
CVE: CVE-2022-23608
CVE: CVE-2022-23608
Id:
CVE-2022-23608
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62 (CONFIRM)
https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f (MISC)
20220304 AST-2022-005: pjproject: undefined behavior after freeing a dialog set (FULLDISC)
http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html (MISC)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
[debian-lts-announce] 20220331 [SECURITY] [DLA 2962-2] pjproject regression update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-24754
CVE: CVE-2022-24754
Id:
CVE-2022-24754
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754
Comment
: PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47 (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662 (CONFIRM)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-24763
CVE: CVE-2022-24763
Id:
CVE-2022-24763
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
Comment
: PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
835 (Loop with Unreachable Exit Condition ('Infinite Loop'))
References:
https://github.com/pjsip/pjproject/security/advisories/GHSA-5x45-qp78-g4p4 (CONFIRM)
https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21 (MISC)
[debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-24764
CVE: CVE-2022-24764
Id:
CVE-2022-24764
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
Comment
: PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00 (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m (CONFIRM)
[debian-lts-announce] 20220328 [SECURITY] [DLA 2962-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-24793
CVE: CVE-2022-24793
Id:
CVE-2022-24793
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
Comment
: PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4 (CONFIRM)
[debian-lts-announce] 20220531 [SECURITY] [DLA 3036-1] pjproject security update (MLIST)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20221117 [SECURITY] [DLA 3194-1] asterisk security update (MLIST)
DSA-5285 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-31031
CVE: CVE-2022-31031
Id:
CVE-2022-31031
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
Comment
: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202 (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj (CONFIRM)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update (MLIST)
DSA-5358 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2022-39244
CVE: CVE-2022-39244
Id:
CVE-2022-39244
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
Comment
: PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue.
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj (CONFIRM)
GLSA-202210-37 (GENTOO)
[debian-lts-announce] 20230222 [SECURITY] [DLA 3335-1] asterisk security update (MLIST)
DSA-5358 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
CVE: CVE-2023-27585
CVE: CVE-2023-27585
Id:
CVE-2023-27585
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27585
Comment
: PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5 (MISC)
https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr (MISC)
https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4 (MISC)
[debian-lts-announce] 20230418 [SECURITY] [DLA 3394-1] asterisk security update (MLIST)
DSA-5438 (DEBIAN)
[debian-lts-announce] 20230829 [SECURITY] [DLA 3549-1] ring security update (MLIST)
Content available only for registered users!
ovaldb@altx-soft.com