Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-24793

Опубликовано: 06 апр. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 7.5

Описание

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record parse_rr(), while the issue in CVE-2023-27585 is in parse_query(). A patch is available in the master branch of the pjsip/pjproject GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting nameserver_count to zero) or use an external resolver instead.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

esm-apps/bionic

released

20180228.1.503da2b~ds1-1ubuntu0.1~esm1
esm-apps/focal

released

20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1
focal

released

20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1
impish

ignored

end of life
lunar

not-affected

20230206.0~ds1-5
mantic

not-affected

20230206.0~ds2-1.3
noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

EPSS

Процентиль: 51%
0.00277
Низкий

4.3 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 3 лет назад

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.

CVSS3: 7.5
debian
около 3 лет назад

PJSIP is a free and open source multimedia communication library writt ...

CVSS3: 7.5
fstec
около 3 лет назад

Уязвимость реализации разрешения DNS мультимедийной коммуникационной библиотеки PJSIP, позволяющая нарушителю выполнить произвольный код

redos
около 3 лет назад

Множественные уязвимости pjproject

EPSS

Процентиль: 51%
0.00277
Низкий

4.3 Medium

CVSS2

7.5 High

CVSS3