First published: Tue Mar 14 2023(Updated: )
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Teluu PJSIP | <2.13 | |
ubuntu/ring | <20180228.1.503 | 20180228.1.503 |
ubuntu/ring | <20190215.1. | 20190215.1. |
ubuntu/ring | <20230206.0~ | 20230206.0~ |
ubuntu/ring | <20230206.0~ | 20230206.0~ |
debian/asterisk | <=1:16.2.1~dfsg-1+deb10u2 | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:16.28.0~dfsg-0+deb11u4 1:20.6.0~dfsg+~cs6.13.40431414-2 |
debian/ring | <=20190215.1.f152c98~ds1-1+deb10u1<=20210112.2.b757bac~ds1-1<=20230206.0~ds2-1.1 | 20190215.1.f152c98~ds1-1+deb10u2 20231201.0~ds1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27585 is a buffer overflow vulnerability in PJSIP DNS resolver affecting versions 2.13 and prior.
Applications that use PJSIP DNS resolver version 2.13 and prior are affected by CVE-2023-27585.
CVE-2023-27585 has a severity rating of 7.5 (high).
Updating to a version of PJSIP that is not affected by CVE-2023-27585 is recommended.
More information about CVE-2023-27585 can be found at the following references: [1] [2] [3].