Table of Contents
  • Home
  • /
  • Blog
  • /
  • Fix The Five Memory Corruption Vulnerabilities In PJSIP Library ASAP
March 2, 2022
|
3m

Fix The Five Memory Corruption Vulnerabilities In PJSIP Library ASAP


Fix The Five Memory Corruption Vulnerabilities In Pjsip Library

The Security team from JFrog has identified five memory corruption vulnerabilities in the PJSIP library, a widely used open-source multimedia communication library from Teluu. Successful exploitation of these vulnerabilities could lead to arbitrary code execution in the application that uses the PJSIP library. We recommend all the application developers read the post that tells how to fix the five memory corruption vulnerabilities in the PJSIP library.

What Is PJSIP Library?

PJSIP is a free and open-source multimedia communication library written in C language. It is most likely used in the implementation of standard protocols such as SIP, SDP, RTP, STUN, TURN, and ICE protocols. It combines signaling protocol (SIP) with a rich multimedia framework and NAT traversal functionality into a high-level API that is compatible with desktops, embedded systems, mobile, and tablets. 

Basically, it provides an API service that supports audio, video, and instant messaging features that can be used in communication platforms such as VoIP phones and conference applications. Now, It is being used in the world’s most popular communication applications such as WhatsApp, BlueJeans, and Asterisk

Summary Of the Five Memory Corruption Vulnerabilities In PJSIP Library:

JFrog’s security team identified five memory corruption vulnerabilities in PJSIP Library whose CVSS scores range from 8.1 to 5.9. Successful exploitation of these vulnerabilities could allow an attacker to perform arbitrary code execution in the application that uses the PJSIP library. Please visit this post from JFrog Security Team for more technical details.

CVE IDDescriptionImpactJFrog CVSS
CVE-2021-43299Stack overflow in PJSUA API when calling pjsua_player_createArbitrary Code Execution8.1
CVE-2021-43300Stack overflow in PJSUA API when calling pjsua_recorder_createArbitrary Code Execution8.1
CVE-2021-43301Stack overflow in PJSUA API when calling pjsua_playlist_createArbitrary Code Execution8.1
CVE-2021-43302Read out-of-bounds in PJSUA API when calling pjsua_recorder_createDenial of Service5.9
CVE-2021-43303Buffer overflow in PJSUA API when calling pjsua_call_dumpDenial of Service5.9

PJSIP Library Affected By These Vulnerabilities:

The PJSIP library before version 2.12 and pass attacker-controlled arguments to any of these following APIs are vulnerable to these memory corruption flaws: 

  • pjsua_player_create – filename argument must be attacker-controlled

  • pjsua_recorder_create – filename argument must be attacker-controlled

  • pjsua_playlist_create – file_names argument must be (partially) attacker-controlled

  • pjsua_call_dump – buffer argument capacity must be smaller than 128 bytes

All the application developers who use PJSIP Library in their development projects need to fix these five memory corruption vulnerabilities in the PJSIP library.

How To Fix The Five Memory Corruption Vulnerabilities In PJSIP Library?

The authors of the PJSIP library has responded to the vulnerabilities as soon as JFrog’s security team reported these flaws to them. PJSIP authors have fixed the flaws by releasing version 2.12. We recommend that all application developers upgrade to v1.12 and above who use the PJSIP library.

We hope this post would help you know How to Fix the Five Memory Corruption Vulnerabilities in PJSIP Library. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on FacebookLinkedInTwitterTelegramTumblr, & Medium and subscribe to receive updates like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Vulnerabilities

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe