MGASA-2021-0337

Source
https://advisories.mageia.org/MGASA-2021-0337.html
Import Source
https://advisories.mageia.org/MGASA-2021-0337.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0337
Related
Published
2021-07-10T20:00:34Z
Modified
2021-07-10T18:44:52Z
Summary
Updated pjproject packages fix security vulnerabilities
Details

Currently, PJSIP transport can be reused if they have the same IP address + port + protocol. However, this is insufficient for secure transport since it lacks remote hostname authentication. The vulnerability allows for an insecure interaction without user awareness. It affects users who need access to connections to different destinations that translate to the same address, and allows man-in-the-middle attack if attacker can route a connection to another destination such as in the case of DNS spoofing (CVE-2020-15260).

An issue has been found in pjproject. Due to bad handling of two consecutive crafted answers to an INVITE, the attacker is able to crash the server resulting in a denial of service (CVE-2021-21375).

References
Credits

Affected packages

Mageia:8 / pjproject

Package

Name
pjproject
Purl
pkg:rpm/mageia/pjproject?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10-5.2.mga8

Ecosystem specific

{
    "section": "core"
}