HomeTeluuCVE-2021-37706

CVE-2021-37706

HIGH
7.3CVSS
Published: 2021-12-22
Updated: 2025-11-04
AI Analysis

Description

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
low
Weaknesses
CWE-191CWE-191

Metadata

Primary Vendor
TELUU
Published
12/22/2021
Last Modified
11/4/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

teluu : pjsipasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asterisksangoma : asterisksangoma : asterisksangoma : asteriskdebian : debian_linuxdebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-37706 | HIGH Severity | CVEDatabase.com | CVEDatabase.com