CVE-2022-24793: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in pjsip pjproject
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.
AI Analysis
Technical Summary
CVE-2022-24793 is a buffer overflow vulnerability classified under CWE-120, affecting the PJSIP pjproject multimedia communication library, specifically versions 2.12 and earlier. PJSIP is widely used for SIP-based VoIP and multimedia communications and is implemented in C. The vulnerability arises in the DNS resolution component of PJSIP, particularly in the function parse_rr(), which processes DNS query records. The flaw is due to a lack of proper bounds checking when copying input data into buffers, leading to a classic buffer overflow scenario. This can result in memory corruption, potentially allowing an attacker to execute arbitrary code, cause application crashes, or disrupt service availability. The vulnerability does not affect users who configure PJSIP to use an external DNS resolver or disable internal DNS resolution by setting the nameserver_count parameter to zero. A patch addressing this issue is available in the master branch of the pjsip/pjproject GitHub repository. This vulnerability is related but distinct from CVE-2023-27585, which affects the parse_query() function. No known exploits have been reported in the wild to date, but the presence of a buffer overflow in a network-facing component represents a significant risk if exploited.
Potential Impact
For European organizations, the impact of CVE-2022-24793 can be substantial, especially for those relying on PJSIP-based communication systems such as VoIP infrastructure, unified communications, and multimedia conferencing solutions. Exploitation could lead to unauthorized code execution, enabling attackers to compromise communication servers, intercept or manipulate voice and video traffic, or cause denial of service conditions. This could disrupt critical business communications, impact customer service, and expose sensitive information. Organizations in sectors such as telecommunications, finance, healthcare, and government, which often deploy PJSIP for real-time communications, are particularly at risk. Additionally, since PJSIP is embedded in various commercial and open-source products, the vulnerability's reach may extend beyond direct users to downstream vendors and service providers. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating PJSIP pjproject to a version beyond 2.12 where the patch is applied. If immediate patching is not feasible, organizations should configure PJSIP to disable its internal DNS resolver by setting the nameserver_count parameter to zero, forcing the use of an external, secure DNS resolver. This configuration change reduces the attack surface by avoiding the vulnerable code path. Additionally, organizations should conduct thorough code audits and penetration testing on their PJSIP implementations to identify any residual risks. Network-level protections such as intrusion detection/prevention systems (IDS/IPS) should be tuned to monitor and alert on anomalous DNS traffic patterns associated with PJSIP services. Vendors and integrators using PJSIP should be engaged to ensure timely updates and to verify that their products incorporate the fix. Finally, maintaining robust endpoint security and network segmentation can limit the impact of any successful exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2022-24793: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in pjsip pjproject
Description
PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that use PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. This vulnerability is related to CVE-2023-27585. The difference is that this issue is in parsing the query record `parse_rr()`, while the issue in CVE-2023-27585 is in `parse_query()`. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver instead.
AI-Powered Analysis
Technical Analysis
CVE-2022-24793 is a buffer overflow vulnerability classified under CWE-120, affecting the PJSIP pjproject multimedia communication library, specifically versions 2.12 and earlier. PJSIP is widely used for SIP-based VoIP and multimedia communications and is implemented in C. The vulnerability arises in the DNS resolution component of PJSIP, particularly in the function parse_rr(), which processes DNS query records. The flaw is due to a lack of proper bounds checking when copying input data into buffers, leading to a classic buffer overflow scenario. This can result in memory corruption, potentially allowing an attacker to execute arbitrary code, cause application crashes, or disrupt service availability. The vulnerability does not affect users who configure PJSIP to use an external DNS resolver or disable internal DNS resolution by setting the nameserver_count parameter to zero. A patch addressing this issue is available in the master branch of the pjsip/pjproject GitHub repository. This vulnerability is related but distinct from CVE-2023-27585, which affects the parse_query() function. No known exploits have been reported in the wild to date, but the presence of a buffer overflow in a network-facing component represents a significant risk if exploited.
Potential Impact
For European organizations, the impact of CVE-2022-24793 can be substantial, especially for those relying on PJSIP-based communication systems such as VoIP infrastructure, unified communications, and multimedia conferencing solutions. Exploitation could lead to unauthorized code execution, enabling attackers to compromise communication servers, intercept or manipulate voice and video traffic, or cause denial of service conditions. This could disrupt critical business communications, impact customer service, and expose sensitive information. Organizations in sectors such as telecommunications, finance, healthcare, and government, which often deploy PJSIP for real-time communications, are particularly at risk. Additionally, since PJSIP is embedded in various commercial and open-source products, the vulnerability's reach may extend beyond direct users to downstream vendors and service providers. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating PJSIP pjproject to a version beyond 2.12 where the patch is applied. If immediate patching is not feasible, organizations should configure PJSIP to disable its internal DNS resolver by setting the nameserver_count parameter to zero, forcing the use of an external, secure DNS resolver. This configuration change reduces the attack surface by avoiding the vulnerable code path. Additionally, organizations should conduct thorough code audits and penetration testing on their PJSIP implementations to identify any residual risks. Network-level protections such as intrusion detection/prevention systems (IDS/IPS) should be tuned to monitor and alert on anomalous DNS traffic patterns associated with PJSIP services. Vendors and integrators using PJSIP should be engaged to ensure timely updates and to verify that their products incorporate the fix. Finally, maintaining robust endpoint security and network segmentation can limit the impact of any successful exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-02-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf2bac
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 11:36:51 AM
Last updated: 7/31/2025, 6:55:34 PM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.