漏洞标题
在 PJSIP 中接收 STUN 消息时的潜在整数下陷
漏洞描述信息
在PJSIP中接收到STUN消息时可能发生整数下溢
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
Potential integer underflow upon receiving STUN message in PJSIP
漏洞描述信息
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
漏洞类别
整数下溢(超界折返)
漏洞标题
PJSIP 数字错误漏洞
漏洞描述信息
PJSIP是一个免费和开源的多媒体通信库,用C语言编写,实现基于标准的协议,如SIP, SDP, RTP, STUN, TURN,和ICE。 PJSIP 存在数字错误漏洞,该漏洞源于传入的 STUN 消息包含 ERROR-CODE 属性,则在执行减法运算之前不会检查标头长度,这可能会导致整数下溢情况。 此问题会影响所有使用 STUN 的用户。 位于受害者网络中的恶意行为者可能会伪造并发送特制的 UDP (STUN) 消息,该消息可以在受害者的机器上远程执行任意代码。
CVSS信息
N/A
漏洞类别
数字错误