Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-24793: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in pjsip pjproject

0
Medium
Published: Wed Apr 06 2022 (04/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: pjsip
Product: pjproject

Description

PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.

AI-Powered Analysis

AILast updated: 06/23/2025, 11:36:51 UTC

Technical Analysis

CVE-2022-24793 is a buffer overflow vulnerability classified under CWE-120, affecting the PJSIP pjproject multimedia communication library, specifically versions 2.12 and earlier. PJSIP is widely used for SIP-based VoIP and multimedia communications and is implemented in C. The vulnerability arises in the DNS resolution component of PJSIP, particularly in the function parse_rr(), which processes DNS query records. The flaw is due to a lack of proper bounds checking when copying input data into buffers, leading to a classic buffer overflow scenario. This can result in memory corruption, potentially allowing an attacker to execute arbitrary code, cause application crashes, or disrupt service availability. The vulnerability does not affect users who configure PJSIP to use an external DNS resolver or disable internal DNS resolution by setting the nameserver_count parameter to zero. A patch addressing this issue is available in the master branch of the pjsip/pjproject GitHub repository. This vulnerability is related but distinct from CVE-2023-27585, which affects the parse_query() function. No known exploits have been reported in the wild to date, but the presence of a buffer overflow in a network-facing component represents a significant risk if exploited.

Potential Impact

For European organizations, the impact of CVE-2022-24793 can be substantial, especially for those relying on PJSIP-based communication systems such as VoIP infrastructure, unified communications, and multimedia conferencing solutions. Exploitation could lead to unauthorized code execution, enabling attackers to compromise communication servers, intercept or manipulate voice and video traffic, or cause denial of service conditions. This could disrupt critical business communications, impact customer service, and expose sensitive information. Organizations in sectors such as telecommunications, finance, healthcare, and government, which often deploy PJSIP for real-time communications, are particularly at risk. Additionally, since PJSIP is embedded in various commercial and open-source products, the vulnerability's reach may extend beyond direct users to downstream vendors and service providers. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating PJSIP pjproject to a version beyond 2.12 where the patch is applied. If immediate patching is not feasible, organizations should configure PJSIP to disable its internal DNS resolver by setting the nameserver_count parameter to zero, forcing the use of an external, secure DNS resolver. This configuration change reduces the attack surface by avoiding the vulnerable code path. Additionally, organizations should conduct thorough code audits and penetration testing on their PJSIP implementations to identify any residual risks. Network-level protections such as intrusion detection/prevention systems (IDS/IPS) should be tuned to monitor and alert on anomalous DNS traffic patterns associated with PJSIP services. Vendors and integrators using PJSIP should be engaged to ensure timely updates and to verify that their products incorporate the fix. Finally, maintaining robust endpoint security and network segmentation can limit the impact of any successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2bac

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 11:36:51 AM

Last updated: 2/4/2026, 3:10:19 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats