{"id":"UBUNTU-CVE-2023-38703","details":"PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.","modified":"2026-01-20T17:40:10.215841Z","published":"2023-10-06T14:15:00Z","upstream":["CVE-2023-38703"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-38703"},{"type":"REPORT","url":"https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d"},{"type":"REPORT","url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-38703"}],"affected":[{"package":{"name":"asterisk","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/asterisk@1:13.1.0~dfsg-1.1ubuntu4.1+esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:13.1.0~dfsg-1.1ubuntu3","1:13.1.0~dfsg-1.1ubuntu4","1:13.1.0~dfsg-1.1ubuntu4.1","1:13.1.0~dfsg-1.1ubuntu4.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"asterisk","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-config","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-dahdi","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-dev","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-mobile","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-modules","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-mp3","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-mysql","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-ooh323","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-voicemail","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-voicemail-imapstorage","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-voicemail-odbcstorage","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"},{"binary_name":"asterisk-vpb","binary_version":"1:13.1.0~dfsg-1.1ubuntu4.1+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}},{"package":{"name":"asterisk","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/asterisk@1:13.18.3~dfsg-1ubuntu4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:13.17.2~dfsg-1ubuntu1","1:13.17.2~dfsg-2ubuntu1","1:13.18.1~dfsg-1ubuntu1","1:13.18.3~dfsg-1ubuntu1","1:13.18.3~dfsg-1ubuntu2","1:13.18.3~dfsg-1ubuntu3","1:13.18.3~dfsg-1ubuntu4"],"ecosystem_specific":{"binaries":[{"binary_name":"asterisk","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-config","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-dahdi","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-dev","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-mobile","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-modules","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-mp3","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-mysql","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-ooh323","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-tests","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-voicemail","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-voicemail-imapstorage","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-voicemail-odbcstorage","binary_version":"1:13.18.3~dfsg-1ubuntu4"},{"binary_name":"asterisk-vpb","binary_version":"1:13.18.3~dfsg-1ubuntu4"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}},{"package":{"name":"ring","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ring@20180228.1.503da2b~ds1-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["20170803.2.5fcfe3f~dfsg1-1","20171024.1.eadbdeb~ds1-1","20171129.2.cf5bbff~ds1-1","20171129.2.cf5bbff~ds1-2","20180119.1.9e06f94~ds1-1","20180119.1.9e06f94~ds1-3","20180222.1.7bffde2~ds2-2","20180228.1.503da2b~ds1-1","20180228.1.503da2b~ds1-1build1","20180228.1.503da2b~ds1-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"ring","binary_version":"20180228.1.503da2b~ds1-1ubuntu0.1~esm1"},{"binary_name":"ring-daemon","binary_version":"20180228.1.503da2b~ds1-1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}},{"package":{"name":"asterisk","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/asterisk@1:16.2.1~dfsg-2ubuntu1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:16.2.1~dfsg-2build2","1:16.2.1~dfsg-2build3","1:16.2.1~dfsg-2ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"asterisk","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-config","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-dahdi","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-dev","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-mobile","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-modules","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-mp3","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-mysql","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-ooh323","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-tests","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-voicemail","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-voicemail-imapstorage","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-voicemail-odbcstorage","binary_version":"1:16.2.1~dfsg-2ubuntu1"},{"binary_name":"asterisk-vpb","binary_version":"1:16.2.1~dfsg-2ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}},{"package":{"name":"ring","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ring@20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["20190215.1.f152c98~ds1-1","20190215.1.f152c98~ds1-1build1","20190215.1.f152c98~ds1-1build2","20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"jami","binary_version":"20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1"},{"binary_name":"jami-daemon","binary_version":"20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1"},{"binary_name":"ring","binary_version":"20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1"},{"binary_name":"ring-daemon","binary_version":"20190215.1.f152c98~ds1-1+deb10u2build0.20.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}},{"package":{"name":"asterisk","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/asterisk@1:18.10.0~dfsg+~cs6.10.40431411-2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:16.16.1~dfsg-2","1:16.16.1~dfsg-4","1:16.16.1~dfsg-4build1","1:16.16.1~dfsg+~2.10-1","1:18.10.0~dfsg+~cs6.10.40431411-2"],"ecosystem_specific":{"binaries":[{"binary_name":"asterisk","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-config","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-dahdi","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-dev","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-mobile","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-modules","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-mp3","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-mysql","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-ooh323","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-tests","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"},{"binary_name":"asterisk-vpb","binary_version":"1:18.10.0~dfsg+~cs6.10.40431411-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}},{"package":{"name":"asterisk","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/asterisk@1:20.6.0~dfsg+~cs6.13.40431414-2build5?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:20.4.0~dfsg+~cs6.13.40431414-2","1:20.5.0~dfsg+~cs6.13.40431414-1","1:20.5.1~dfsg+~cs6.13.40431414-1","1:20.5.2~dfsg+~cs6.13.40431414-1","1:20.6.0~dfsg+~cs6.13.40431414-1","1:20.6.0~dfsg+~cs6.13.40431414-2","1:20.6.0~dfsg+~cs6.13.40431414-2build3","1:20.6.0~dfsg+~cs6.13.40431414-2build4","1:20.6.0~dfsg+~cs6.13.40431414-2build5"],"ecosystem_specific":{"binaries":[{"binary_name":"asterisk","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-config","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-dahdi","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-dev","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-mobile","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-modules","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-mp3","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-mysql","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-ooh323","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"},{"binary_name":"asterisk-tests","binary_version":"1:20.6.0~dfsg+~cs6.13.40431414-2build5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}},{"package":{"name":"asterisk","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/asterisk@1:22.5.2~dfsg+~cs6.15.60671435-1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:22.2.0~dfsg+~cs6.15.60671435-2","1:22.3.0~dfsg+~cs6.15.60671435-1","1:22.4.1~dfsg+~cs6.15.60671435-1","1:22.4.1~dfsg+~cs6.15.60671435-2","1:22.5.1~dfsg+~cs6.15.60671435-1","1:22.5.2~dfsg+~cs6.15.60671435-1"],"ecosystem_specific":{"binaries":[{"binary_name":"asterisk","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-config","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-dahdi","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-dev","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-mobile","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-modules","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-mp3","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-mysql","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-ooh323","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"},{"binary_name":"asterisk-tests","binary_version":"1:22.5.2~dfsg+~cs6.15.60671435-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38703.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}