CVE-2021-37706

7.3 HIGH
Published: December 22, 2021 Modified: November 04, 2025

Description

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
Source: security-advisories@github.com
Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2022/Mar/0
Source: security-advisories@github.com
Mailing List Patch Third Party Advisory
https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
Source: security-advisories@github.com
Patch Third Party Advisory
https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
Source: security-advisories@github.com
Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
Source: security-advisories@github.com
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
Source: security-advisories@github.com
Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202210-37
Source: security-advisories@github.com
Third Party Advisory
https://www.debian.org/security/2022/dsa-5285
Source: security-advisories@github.com
Third Party Advisory
http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2022/Mar/0
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202210-37
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2022/dsa-5285
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

19 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.3 / 10.0
EPSS (Exploit Probability)
0.5%
66th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

sangoma asterisk debian teluu