CVE-2026-32945

Source
https://cve.org/CVERecord?id=CVE-2026-32945
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32945.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-32945
Aliases
  • GHSA-jr2p-p2w4-rr9q
Downstream
Published
2026-03-20T03:54:00.813Z
Modified
2026-04-12T20:14:08.610824Z
Severity
  • 8.4 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
PJSIP is vulnerable to Heap-based Buffer Overflow through DNS parser
Details

PJSIP is a free and open source multimedia communication library written in C. Versions 2.16 and below have a Heap-based Buffer Overflowvulnerability in the DNS parser's name length handler. Thisimpacts applications using PJSIP's built-in DNS resolver, such as those configured with pjsuaconfig.nameserver or UaConfig.nameserver in PJSUA/PJSUA2. It does not affect users who rely on the OS resolver (e.g., getaddrinfo()) by not configuring a nameserver, or those using an external resolver via pjsipresolversetextresolver(). This issue is fixed in version 2.17. For users unable to upgrade, a workaround is to disable DNS resolution in the PJSIP config (by setting nameservercount to zero) or to use an external resolver implementation instead.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32945.json",
    "cwe_ids": [
        "CWE-122"
    ]
}
References

Affected packages

Git / github.com/pjsip/pjproject

Affected ranges

Type
GIT
Repo
https://github.com/pjsip/pjproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*
2.10
2.11
2.12
2.13
2.14
2.15
2.16

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32945.json"
vanir_signatures
[
    {
        "digest": {
            "length": 949.0,
            "function_hash": "322123608833366153724552989250038448616"
        },
        "id": "CVE-2026-32945-86afcf85",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "source": "https://github.com/pjsip/pjproject/commit/5311aee398ae9d623829a6bad7b679a193c9e199",
        "target": {
            "function": "get_name",
            "file": "pjlib-util/src/pjlib-util/dns.c"
        }
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "264949189043664718990654898728157479626",
                "161875752343422826252201417836625224675",
                "52373331600092458484224350296297334007",
                "208200197820416807573589979754305500114",
                "84578190726999691662658596078196574153",
                "52373331600092458484224350296297334007"
            ]
        },
        "id": "CVE-2026-32945-a9672f0d",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "source": "https://github.com/pjsip/pjproject/commit/5311aee398ae9d623829a6bad7b679a193c9e199",
        "target": {
            "file": "pjlib-util/src/pjlib-util/dns.c"
        }
    },
    {
        "digest": {
            "length": 989.0,
            "function_hash": "210276497721837895778913101976107396684"
        },
        "id": "CVE-2026-32945-ec5963f9",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "source": "https://github.com/pjsip/pjproject/commit/5311aee398ae9d623829a6bad7b679a193c9e199",
        "target": {
            "function": "get_name_len",
            "file": "pjlib-util/src/pjlib-util/dns.c"
        }
    }
]
vanir_signatures_modified
"2026-04-12T20:14:08Z"