CVE-2023-27585

Name
CVE-2023-27585
Description
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
MISC https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
MISC https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
MISC https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
MLIST https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html
DEBIAN https://www.debian.org/security/2023/dsa-5438
MLIST https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* pjsip >= None < 2.13

Vulnerable and fixed packages

Source package Branch Version Maintainer Status