CVE-2023-27585

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-27585
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27585.json
Aliases
Related
Published
2023-03-14T17:15:19Z
Modified
2023-11-29T09:55:38.976607Z
Details

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record parse_query(), while the issue in CVE-2022-24793 is in parse_rr(). A patch is available as commit d1c5e4d in the master branch. A workaround is to disable DNS resolution in PJSIP config (by setting nameserver_count to zero) or use an external resolver implementation instead.

References

Affected packages

Alpine:v3.18 / pjproject

Package

Name
pjproject

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
2.13.1-r0

Affected versions

1.*

1.0.1-r0
1.4-r0
1.4-r1
1.6-r0
1.6-r1
1.6-r2
1.10-r0

2.*

2.0-r0
2.1-r0
2.2-r0
2.2.1-r0
2.3-r0
2.4-r0
2.4.5-r0
2.5.5-r0
2.5.5-r1
2.5.5-r2
2.5.5-r3
2.5.5-r4
2.7.2-r0
2.7.2-r1
2.7.2-r2
2.7.2-r3
2.7.2-r4
2.8-r0
2.9-r0
2.11-r0
2.11.1-r0
2.11.1-r1
2.11.1-r2
2.12-r0
2.12.1-r0
2.12.1-r1
2.12.1-r2
2.12.1-r3
2.13-r0
2.13-r1
2.13-r2

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0The exact introduced commit is unknown
Fixed

Affected versions

2.*

2.10
2.11
2.12
2.13