CVE-2022-24793

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24793
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24793.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24793
Aliases
  • GHSA-p6g5-v97c-w5q4
Downstream
Published
2022-04-06T00:00:00Z
Modified
2025-10-14T19:13:37.787311Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Potential heap buffer overflow when parsing DNS packets in PJSIP
Details

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record parse_rr(), while the issue in CVE-2023-27585 is in parse_query(). A patch is available in the master branch of the pjsip/pjproject GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting nameserver_count to zero) or use an external resolver instead.

References

Affected packages

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*

2.10
2.11
2.12