CVE-2021-21375
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service.
Published
2021-03-10T23:15:12.520
Last Modified
2024-11-21T05:48:13.620
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 6.5 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
-
Type: Secondary
CWE-400
-
Type: Primary
CWE-754
Affected Vendors & Products
References
-
https://github.com/pjsip/pjproject/commit/97b3d7addbaa720b7ddb0af9bf6f3e443e664365
Patch, Third Party Advisory
([email protected])
-
https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp
Exploit, Patch, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2021/04/msg00023.html
Mailing List, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2021/05/msg00020.html
Mailing List, Third Party Advisory
([email protected])
-
https://security.gentoo.org/glsa/202107-42
Third Party Advisory
([email protected])
-
https://github.com/pjsip/pjproject/commit/97b3d7addbaa720b7ddb0af9bf6f3e443e664365
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp
Exploit, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2021/04/msg00023.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2021/05/msg00020.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/202107-42
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)