CVE-2023-27585

Name
CVE-2023-27585
Description
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
MISC https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
MISC https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
MISC https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
mailing-list https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html
vendor-advisory https://www.debian.org/security/2023/dsa-5438
mailing-list https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2024/09/msg00030.html

Match rules

CPE URI Source package Min version Max version
pjproject >= 0 <= 2.13

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
pjproject edge-main 2.13.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
pjproject edge-main 2.13-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
pjproject edge-main 2.12.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
pjproject edge-main 2.12-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
pjproject edge-main 2.11.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
pjproject edge-main 2.11-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
pjproject 3.22-main 2.13.1-r0 None fixed
pjproject 3.22-main 2.13-r0 None possibly vulnerable
pjproject 3.22-main 2.12.1-r0 None possibly vulnerable
pjproject 3.22-main 2.12-r0 None possibly vulnerable
pjproject 3.22-main 2.11.1-r0 None possibly vulnerable
pjproject 3.22-main 2.11-r0 None possibly vulnerable
pjproject 3.21-main 2.13.1-r0 None fixed
pjproject 3.21-main 2.13-r0 None possibly vulnerable
pjproject 3.21-main 2.12.1-r0 None possibly vulnerable
pjproject 3.21-main 2.12-r0 None possibly vulnerable
pjproject 3.21-main 2.11.1-r0 None possibly vulnerable
pjproject 3.21-main 2.11-r0 None possibly vulnerable
pjproject 3.20-main 2.13.1-r0 None fixed
pjproject 3.20-main 2.13-r0 None possibly vulnerable
pjproject 3.20-main 2.12.1-r0 None possibly vulnerable
pjproject 3.20-main 2.12-r0 None possibly vulnerable
pjproject 3.20-main 2.11.1-r0 None possibly vulnerable
pjproject 3.20-main 2.11-r0 None possibly vulnerable
pjproject 3.19-main 2.13.1-r0 None fixed
pjproject 3.19-main 2.13-r0 None possibly vulnerable
pjproject 3.19-main 2.12.1-r0 None possibly vulnerable
pjproject 3.19-main 2.12-r0 None possibly vulnerable
pjproject 3.19-main 2.11.1-r0 None possibly vulnerable
pjproject 3.19-main 2.11-r0 None possibly vulnerable
pjproject 3.18-main 2.13.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed