First published: Fri Oct 06 2023(Updated: )
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.13.1 | ||
Teluu PJSIP | <=2.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38703 is a vulnerability in the PJSIP multimedia communication library that allows for unauthorized access and potential remote code execution.
PJSIP is a free and open source multimedia communication library written in C with high-level APIs in C, C++, Java, C#, and Python.
CVE-2023-38703 has a severity of critical with a CVSS score of 9.8.
SRTP is a higher-level media transport used in PJSIP, which is stacked upon a lower-level transport such as UDP and ICE.
To fix CVE-2023-38703, you should update the affected software to version 2.13.2 or later.