CVE-2021-43303Classic Buffer Overflow in Asterisk

Severity
9.8CRITICALNVD
EPSS
0.4%
top 38.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 16
Latest updateMar 24

Description

Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlled 'buffer' argument may cause a buffer overflow, since supplying an output buffer smaller than 128 characters may overflow the output buffer, regardless of the 'maxlen' argument supplied

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

debiandebian/ring< asterisk 1:16.28.0~dfsg-0+deb11u1 (bullseye)
debiandebian/asterisk< asterisk 1:16.28.0~dfsg-0+deb11u1 (bullseye)
Ubuntupjsip/pjproject< 2.1.0.0.ast20130823-1+deb8u1ubuntu0.1~esm1+1
CVEListV5teluu/pjsipunspecified2.11.1
NVDteluu/pjsip2.11.1

Also affects: Debian Linux 10.0, 11.0, 9.0

Patches

🔴Vulnerability Details

5
OSV
pjproject vulnerabilities2026-03-24
OSV
ring vulnerabilities2023-10-24
OSV
ring vulnerabilities2023-10-09
GHSA
GHSA-f7jc-p66f-75xp: Buffer overflow in PJSUA API when calling pjsua_call_dump2022-02-17
OSV
CVE-2021-43303: Buffer overflow in PJSUA API when calling pjsua_call_dump2022-02-16

📋Vendor Advisories

4
Ubuntu
PJSIP vulnerabilities2026-03-24
Ubuntu
Ring vulnerabilities2023-10-24
Ubuntu
Ring vulnerabilities2023-10-09
Debian
CVE-2021-43303: asterisk - Buffer overflow in PJSUA API when calling pjsua_call_dump. An attacker-controlle...2021
CVE-2021-43303 — Classic Buffer Overflow in Asterisk | cvebase