Pion Interceptor RTP Packet Parsing Vulnerability Leading to Remote Panic
Pion Interceptor, a framework for RTP/RTCP communication software, has a vulnerability in versions v0.1.36 through v0.1.38 involving its RTP packet factory. An attacker can exploit this weakness by sending crafted RTP packets to trigger a panic in Pion-based SFU implementations. The issue exclusively impacts users of pion/interceptor. To mitigate the risk, users are recommended to upgrade to version v0.1.39 or later, which includes validation checks to prevent potential overflows by ensuring `padLen > 0 && padLen <= payloadLength`. If immediate upgrading is not feasible, users can manually apply the patch from the associated pull request or implement a workaround by dropping packets where the P-bit is set but the padLen is zero or exceeds the remaining payload length.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pion interceptor |