Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32945: CWE-122: Heap-based Buffer Overflow in pjsip pjproject

0
High
VulnerabilityCVE-2026-32945cvecve-2026-32945cwe-122
Published: Fri Mar 20 2026 (03/20/2026, 03:54:00 UTC)
Source: CVE Database V5
Vendor/Project: pjsip
Product: pjproject

Description

CVE-2026-32945 is a high-severity heap-based buffer overflow vulnerability in the DNS parser of the PJSIP pjproject library versions 2. 16 and below. It arises from improper handling of name length in DNS responses when using PJSIP's built-in DNS resolver. Exploitation requires no authentication or user interaction but has a high attack complexity. The vulnerability can lead to memory corruption, potentially allowing remote code execution or denial of service. Systems using PJSIP with configured internal DNS resolvers (via pjsua_config. nameserver or UaConfig. nameserver) are affected, while those relying on OS or external resolvers are not. The issue is fixed in version 2. 17.

AI-Powered Analysis

AILast updated: 03/20/2026, 04:23:47 UTC

Technical Analysis

PJSIP is an open-source multimedia communication library widely used in VoIP and real-time communication applications. Versions up to 2.16 contain a heap-based buffer overflow vulnerability (CWE-122) in the DNS parser component, specifically in the handling of the name length field within DNS responses when using PJSIP's built-in DNS resolver. This flaw allows an attacker to craft malicious DNS responses that overflow the heap buffer, leading to memory corruption. The vulnerability does not affect users who rely on the operating system's DNS resolver (e.g., getaddrinfo()) or those who configure PJSIP to use an external DNS resolver via pjsip_resolver_set_ext_resolver(). Exploitation requires no privileges or user interaction but has a high attack complexity due to the need to control DNS responses. The CVSS 4.0 score is 8.4 (high severity), reflecting the potential for remote code execution or denial of service. The vulnerability was publicly disclosed on March 20, 2026, and fixed in PJSIP version 2.17. For environments where upgrading is not immediately feasible, disabling internal DNS resolution by setting nameserver_count to zero or switching to an external resolver are recommended workarounds.

Potential Impact

The heap-based buffer overflow in PJSIP's DNS parser can lead to severe consequences including remote code execution, application crashes, or denial of service. Given PJSIP's widespread use in VoIP systems, IP telephony, and multimedia communication platforms, exploitation could disrupt critical communication infrastructure, compromise confidentiality and integrity of communications, and potentially allow attackers to execute arbitrary code on affected systems. This could lead to interception or manipulation of voice or video calls, unauthorized access to communication endpoints, and broader network compromise. The vulnerability's remote exploitability without authentication increases the risk profile, especially in environments exposing PJSIP services to untrusted networks. Organizations relying on PJSIP for real-time communications are at risk of operational disruption and data breaches if unpatched.

Mitigation Recommendations

1. Upgrade all PJSIP pjproject deployments to version 2.17 or later, where the vulnerability is fixed. 2. For environments unable to upgrade immediately, disable the built-in DNS resolver by setting nameserver_count to zero in the PJSIP configuration to prevent use of the vulnerable DNS parser. 3. Alternatively, configure PJSIP to use an external DNS resolver implementation via pjsip_resolver_set_ext_resolver(), which bypasses the vulnerable code path. 4. Monitor network traffic for anomalous DNS responses that could indicate exploitation attempts. 5. Employ network-level protections such as DNS response validation and filtering to reduce exposure to malicious DNS packets. 6. Conduct thorough testing of communication applications after applying mitigations to ensure stability and functionality. 7. Maintain an inventory of all systems using PJSIP to ensure comprehensive patching and configuration management. 8. Educate development and operations teams about the risks of using built-in DNS resolvers in security-sensitive applications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T00:05:53.283Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcc873e32a4fbe5f2a790f

Added to database: 3/20/2026, 4:09:23 AM

Last enriched: 3/20/2026, 4:23:47 AM

Last updated: 3/20/2026, 6:32:10 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses