PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3394-1 asterisk security update
Debian DLA Debian DLA DLA-3549-1 ring security update
Debian DLA Debian DLA DLA-3887-1 ring security update
Debian DSA Debian DSA DSA-5438-1 asterisk security update
Debian DSA Debian DSA DSA-5956-1 ring security update
EUVD EUVD EUVD-2023-31328 PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
Ubuntu USN Ubuntu USN USN-6422-1 Ring vulnerabilities
Ubuntu USN Ubuntu USN USN-6422-2 Ring vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00363}

epss

{'score': 0.00327}


Tue, 25 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-25T14:57:59.935Z

Reserved: 2023-03-04T00:00:00.000Z

Link: CVE-2023-27585

cve-icon Vulnrichment

Updated: 2024-08-02T12:16:36.086Z

cve-icon NVD

Status : Modified

Published: 2023-03-14T17:15:19.587

Modified: 2024-11-21T07:53:12.153

Link: CVE-2023-27585

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.