CVE-2021-43300Stack-based Buffer Overflow in Asterisk

Severity
9.8CRITICALNVD
EPSS
0.4%
top 38.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 16
Latest updateMar 24

Description

Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

debiandebian/ring< asterisk 1:16.28.0~dfsg-0+deb11u1 (bullseye)
debiandebian/asterisk< asterisk 1:16.28.0~dfsg-0+deb11u1 (bullseye)
Ubuntupjsip/pjproject< 2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1+1
CVEListV5teluu/pjsipunspecified2.11.1
NVDteluu/pjsip2.11.1

Also affects: Debian Linux 10.0, 11.0, 9.0

Patches

🔴Vulnerability Details

5
OSV
pjproject vulnerabilities2026-03-24
OSV
ring vulnerabilities2023-10-24
OSV
ring vulnerabilities2023-10-09
GHSA
GHSA-xqp8-79vm-66m9: Stack overflow in PJSUA API when calling pjsua_recorder_create2022-02-17
OSV
CVE-2021-43300: Stack overflow in PJSUA API when calling pjsua_recorder_create2022-02-16

📋Vendor Advisories

4
Ubuntu
PJSIP vulnerabilities2026-03-24
Ubuntu
Ring vulnerabilities2023-10-24
Ubuntu
Ring vulnerabilities2023-10-09
Debian
CVE-2021-43300: asterisk - Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-cont...2021
CVE-2021-43300 — Stack-based Buffer Overflow | cvebase