Search for vulnerabilities
Vulnerability details: VCID-djaa-ugv5-aaas
Vulnerability ID VCID-djaa-ugv5-aaas
Aliases CVE-2023-38703
Summary PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
Status Published
Exploitability 0.5
Weighted Severity 8.8
Risk 4.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00166 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00381 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.00904 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
epss 0.02817 https://api.first.org/data/v1/epss?cve=CVE-2023-38703
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2023-38703
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2023-38703
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-38703
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-38703
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.51579
EPSS Score 0.00148
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.