CVE-2023-27585

NameCVE-2023-27585
DescriptionPJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn't affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. The difference is that this issue is in parsing the query record `parse_query()`, while the issue in CVE-2022-24793 is in `parse_rr()`. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3394-1, DLA-3549-1, DLA-3887-1, DSA-5438-1, ELA-835-1
Debian Bugs1036697

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)jessie, jessie (lts)1:11.13.1~dfsg-2+deb8u8vulnerable
stretch (security)1:13.14.1~dfsg-2+deb9u6fixed
stretch (lts), stretch1:13.14.1~dfsg-2+deb9u10fixed
buster, buster (lts)1:16.28.0~dfsg-0+deb10u5fixed
buster (security)1:16.28.0~dfsg-0+deb10u4fixed
bullseye1:16.28.0~dfsg-0+deb11u4fixed
bullseye (security)1:16.28.0~dfsg-0+deb11u5fixed
sid1:22.1.0~dfsg+~cs6.14.60671435-1fixed
pjproject (PTS)jessie, jessie (lts)2.1.0.0.ast20130823-1+deb8u1vulnerable
stretch (security)2.5.5~dfsg-6+deb9u5vulnerable
stretch (lts), stretch2.5.5~dfsg-6+deb9u9fixed
ring (PTS)stretch (security), stretch (lts), stretch20161221.2.7bd7d91~dfsg1-1+deb9u1vulnerable
buster (security), buster, buster (lts)20190215.1.f152c98~ds1-1+deb10u2fixed
bullseye20210112.2.b757bac~ds1-1vulnerable
bullseye (security)20210112.2.b757bac~ds1-1+deb11u1fixed
bookworm20230206.0~ds2-1.1vulnerable
sid20231201.0~ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksourcejessie(unfixed)end-of-life
asterisksourcestretch(not affected)
asterisksourcebuster1:16.28.0~dfsg-0+deb10u3DLA-3394-1
asterisksourcebullseye1:16.28.0~dfsg-0+deb11u3DSA-5438-1
asterisksource(unstable)1:20.4.0~dfsg+~cs6.13.40431414-11036697
pjprojectsourcejessie(unfixed)end-of-life
pjprojectsourcestretch2.5.5~dfsg-6+deb9u9ELA-835-1
pjprojectsource(unstable)(unfixed)
ringsourcestretch(unfixed)end-of-life
ringsourcebuster20190215.1.f152c98~ds1-1+deb10u2DLA-3549-1
ringsourcebullseye20210112.2.b757bac~ds1-1+deb11u1DLA-3887-1
ringsource(unstable)20230922.0~ds1-1

Notes

https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
[stretch] - asterisk <not-affected> (The vulnerable code is in pjproject)

Search for package or bug name: Reporting problems