PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "16.8.0"
},
{
"introduced": "0"
},
{
"last_affected": "16.8.0"
},
{
"introduced": "16.0.0"
},
{
"fixed": "16.24.1"
},
{
"introduced": "18.0.0"
},
{
"fixed": "18.10.1"
},
{
"introduced": "19.0.0"
},
{
"fixed": "19.2.1"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-37706.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]
[
{
"signature_version": "v1",
"target": {
"file": "pjnath/src/pjnath/stun_msg.c"
},
"source": "https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865",
"deprecated": false,
"digest": {
"line_hashes": [
"286375471227338908900759340395951320869",
"337170165584158815641361604078421931103",
"218425442522531084557250897674746904437",
"215575948014480304126719586812745130850"
],
"threshold": 0.9
},
"id": "CVE-2021-37706-6c9a95f2",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "pjnath/src/pjnath/stun_msg.c",
"function": "decode_errcode_attr"
},
"source": "https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865",
"deprecated": false,
"digest": {
"function_hash": "166111760674862860056573304105766004106",
"length": 452.0
},
"id": "CVE-2021-37706-9e426c0f",
"signature_type": "Function"
}
]