• Knowledgebase
  • Knowledgebase
  • Englisch
    • Deutsch
  • magnifier
  • ProCall DataCenter
  • ProCall NEX
  • ProCall Enterprise
  • ProCall Voice Services
  • ProCall Business
  • ProCall Meetings
  • ProCall Analytics
  • ProCall One
  • ECSTA
  • MetaDirectory Enterprise
  • LiveChat
  • ixi-UMS
  • UCConnect
  • Products
  • Security advice
    • Security advisory: Microsofts WiX-Installer-Toolset
    • Security advisory: Vulnerability to zlib memory corruption (CVE-2018-25032)
    • Security advisory: ProCall Enterprise XMPP Federation and ECSTA for SIP phones
    • Security advisory: ProCall Enterprise WebService – jquery versions between 1.2 and 3.5
    • estos software not affected by critical vulnerability in log4j (CVE-2021-44228)
    • Security advisory: ProCall Enterprise client for Windows – Apache log4net versions prior to 2.0.10
    • Security advisory: ProCall Enterprise remote code execution vulnerability (http)
    • Security advisory: ProCall Enterprise remote code execution vulnerability
    • estos software not affected by critical vulnerability in PJSIP
    • Security advisory: ProCall Enterprise webrtc third_party boringssl CVE-2022-0778
    • estos software not affected by critical vulnerability in Log4Spring (CVE-2022-22963)
  • Support
  • Release Notes
  • estos Partners
  • Knowledgebase
  • …
  • Current: estos software not affected by critical vulnerability in PJSIP

estos software not affected by critical vulnerability in PJSIP

State of knowledge

04 March 2022

Critical security vulnerabilities in the open-source multimedia communications library PJSIP are warned.

  • https://nvd.nist.gov/vuln/detail/CVE-2021-43299
  • https://nvd.nist.gov/vuln/detail/CVE-2021-43300
  • https://nvd.nist.gov/vuln/detail/CVE-2021-43301
  • https://nvd.nist.gov/vuln/detail/CVE-2021-43302
  • https://nvd.nist.gov/vuln/detail/CVE-2021-43303

estos products are not affected by this vulnerability and can continue to be used without modification and without hesitation.

Supplementary notes

  • INFO - https://jfrog.com/blog/jfrog-discloses-5-memory-corruption-vulnerabilities-in-pjsip-a-popular-multimedia-library/
  • Patch - https://github.com/pjsip/pjproject/releases/tag/2.12
  • Patch - https://github.com/pjsip/pjproject/commit/d979253c924a686fa511d705be1f3ad0c5b20337“


Auf dieser Seite
  1. Supplementary notes
Knowledgebase Logo
Footer Link 1 / Footer Link 2
Copyright © 2025 K15t • Powered by Scroll Viewport and Atlassian Confluence