Popular open-source PJSIP library is affected by critical flaws

Researchers from JFrog’s Security Research team discovered five vulnerabilities in the PJSIP open-source multimedia communication library.

Researchers from JFrog’s Security Research team discovered five vulnerabilities in the popular PJSIP open-source multimedia communication library.

PJSIP is a communication library written in C language implementing standard-based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. It combines signaling protocol (SIP) with rich multimedia framework and NAT traversal functionality into high level API that is portable and suitable for almost any type of systems ranging from desktops, embedded systems, to mobile handsets.

PJSIP supports audio, video, presence, and instant messaging, the APT supplied by the library can be used by IP telephony applications, including VoIP devices.

Many popular communication applications use the library, including WhatsApp, BlueJeans and Asterisk.

An attacker can exploit the flaws to gain arbitrary code execution on devices running applications using the vulnerable library or to trigger a denial-of-service (DoS) condition.

Below is the list of the flaws discovered in the PJSIP library:

CVE IDDescriptionImpactJFrog CVSSCVE-2021-43299Stack overflow in PJSUA API when calling pjsua_player_createCode Execution8.1CVE-2021-43300Stack overflow in PJSUA API when calling pjsua_recorder_createCode Execution8.1CVE-2021-43301Stack overflow in PJSUA API when calling pjsua_playlist_createCode Execution8.1CVE-2021-43302Read out-of-bounds in PJSUA API when calling pjsua_recorder_createDenial of Service5.9CVE-2021-43303Buffer overflow in PJSUA API when calling pjsua_call_dumpDenial of Service5.9Maintainers for the library addressed them with the release of version 2.12 on February 24, 2022.

“Buffers used in PJSIP typically have limited sizes, especially the ones allocated in the stack or supplied by the application, however in several places, we do not check if our usage can exceed the sizes.” wrote PJSIP’s developer Sauw Ming.

Follow me on Twitter: @securityaffairs and Facebook

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}

try {
window._mNHandle.queue.push(function (){
window._mNDetails.loadTag(“816788371”, “300×250”, “816788371”);
});
}
catch (error) {}
Pierluigi Paganini

(SecurityAffairs – hacking, open-source library)

The post Popular open-source PJSIP library is affected by critical flaws appeared first on Security Affairs.