Mageia 2021-0337: pjproject security update | LinuxSecurity.com

Advisories

MGASA-2021-0337 - Updated pjproject packages fix security vulnerabilities

Publication date: 10 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0337.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2020-15260,
     CVE-2021-21375

Currently, PJSIP transport can be reused if they have the same IP address
+ port + protocol. However, this is insufficient for secure transport since
it lacks remote hostname authentication. The vulnerability allows for an
insecure interaction without user awareness. It affects users who need access
to connections to different destinations that translate to the same address,
and allows man-in-the-middle attack if attacker can route a connection to
another destination such as in the case of DNS spoofing (CVE-2020-15260).

An issue has been found in pjproject. Due to bad handling of two consecutive
crafted answers to an INVITE, the attacker is able to crash the server
resulting in a denial of service (CVE-2021-21375).

References:
- https://bugs.mageia.org/show_bug.cgi?id=28998
- https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph
- https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp
- https://www.debian.org/lts/security/2021/dla-2636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375

SRPMS:
- 8/core/pjproject-2.10-5.2.mga8

Mageia 2021-0337: pjproject security update

Currently, PJSIP transport can be reused if they have the same IP address + port + protocol

Summary

Currently, PJSIP transport can be reused if they have the same IP address + port + protocol. However, this is insufficient for secure transport since it lacks remote hostname authentication. The vulnerability allows for an insecure interaction without user awareness. It affects users who need access to connections to different destinations that translate to the same address, and allows man-in-the-middle attack if attacker can route a connection to another destination such as in the case of DNS spoofing (CVE-2020-15260).
An issue has been found in pjproject. Due to bad handling of two consecutive crafted answers to an INVITE, the attacker is able to crash the server resulting in a denial of service (CVE-2021-21375).

References

- https://bugs.mageia.org/show_bug.cgi?id=28998

- https://github.com/pjsip/pjproject/security/advisories/GHSA-8hcp-hm38-mfph

- https://github.com/pjsip/pjproject/security/advisories/GHSA-hvq6-f89p-frvp

- https://www.debian.org/lts/security/2021/dla-2636

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375

Resolution

MGASA-2021-0337 - Updated pjproject packages fix security vulnerabilities

SRPMS

- 8/core/pjproject-2.10-5.2.mga8

Severity
Publication date: 10 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0337.html
Type: security
CVE: CVE-2020-15260, CVE-2021-21375

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.