Bug 2449443 (CVE-2026-32945) - CVE-2026-32945 PJSIP: pjproject: PJSUA: PJSUA2: PJSIP: Heap-based buffer overflow in DNS parser may lead to arbitrary code execution or denial of service.
Summary: CVE-2026-32945 PJSIP: pjproject: PJSUA: PJSUA2: PJSIP: Heap-based buffer over...
Keywords:
Status: NEW
Alias: CVE-2026-32945
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2450663 2450664
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-20 05:02 UTC by OSIDB Bzimport
Modified: 2026-03-24 09:29 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-20 05:02:41 UTC
PJSIP is a free and open source multimedia communication library written in C. Versions 2.16 and below have a Heap-based Buffer Overflowvulnerability in the DNS parser's name length handler. Thisimpacts applications using PJSIP's built-in DNS resolver, such as those configured with pjsua_config.nameserver or UaConfig.nameserver in PJSUA/PJSUA2. It does not affect users who rely on the OS resolver (e.g., getaddrinfo()) by not configuring a nameserver, or those using an external resolver via pjsip_resolver_set_ext_resolver(). This issue is fixed in version 2.17. For users unable to upgrade, a workaround is to disable DNS resolution in the PJSIP config (by setting nameserver_count to zero) or to use an external resolver implementation instead.


Note You need to log in before you can comment on or make changes to this bug.