Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-24793

Опубликовано: 06 апр. 2022
Источник: debian

Описание

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
asteriskfixed1:18.14.0~~rc1~dfsg+~cs6.12.40431414-1package
asterisknot-affectedstretchpackage
pjprojectremovedpackage
ringfixed20230206.0~ds1-1package
ringno-dsabookwormpackage

Примечания

  • https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4

  • https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.

CVSS3: 7.5
nvd
около 3 лет назад

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.

CVSS3: 7.5
fstec
около 3 лет назад

Уязвимость реализации разрешения DNS мультимедийной коммуникационной библиотеки PJSIP, позволяющая нарушителю выполнить произвольный код

redos
около 3 лет назад

Множественные уязвимости pjproject