CVE-2023-27585
Debian Security Advisory 5438-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. It was discovered that Ring incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-03-04 CVE Reserved
- 2023-03-14 CVE Published
- 2025-02-25 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html | Mailing List |
|
https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm | Product |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5 | 2023-08-30 | |
https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr | 2023-08-30 |
URL | Date | SRC |
---|---|---|
https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4 | 2023-08-30 | |
https://www.debian.org/security/2023/dsa-5438 | 2023-08-30 |