CVE-2021-43804

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-43804
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-43804.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-43804
Downstream
Related
  • GHSA-3qx3-cg72-wrh9
Published
2021-12-22T18:15:07Z
Modified
2025-10-14T18:54:45.680897Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.

References

Affected packages

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.10
2.11

Database specific

{
    "vanir_signatures": [
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "pjmedia/src/pjmedia/rtcp.c"
            },
            "id": "CVE-2021-43804-21f02fcb",
            "digest": {
                "line_hashes": [
                    "103894779853426178814937399479854292327",
                    "130803791047819453649259362093641933649",
                    "122525548633403368601872048441338313566",
                    "129850034086129389672742617489432174938",
                    "106737951759900644022218887804782806478",
                    "169713399488750805111827828987683376328"
                ],
                "threshold": 0.9
            },
            "signature_version": "v1",
            "source": "https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e"
        },
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "pjmedia/src/pjmedia/rtcp.c",
                "function": "parse_rtcp_bye"
            },
            "id": "CVE-2021-43804-252f8bbe",
            "digest": {
                "length": 456.0,
                "function_hash": "276740140683552634685635405292978235453"
            },
            "signature_version": "v1",
            "source": "https://github.com/pjsip/pjproject/commit/8b621f192cae14456ee0b0ade52ce6c6f258af1e"
        }
    ]
}