漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Potential integer underflow upon receiving STUN message in PJSIP
Vulnerability Description
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
整数下溢(超界折返)
Vulnerability Title
PJSIP 数字错误漏洞
Vulnerability Description
PJSIP是一个免费和开源的多媒体通信库,用C语言编写,实现基于标准的协议,如SIP, SDP, RTP, STUN, TURN,和ICE。 PJSIP 存在数字错误漏洞,该漏洞源于传入的 STUN 消息包含 ERROR-CODE 属性,则在执行减法运算之前不会检查标头长度,这可能会导致整数下溢情况。 此问题会影响所有使用 STUN 的用户。 位于受害者网络中的恶意行为者可能会伪造并发送特制的 UDP (STUN) 消息,该消息可以在受害者的机器上远程执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A