Description
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
References (3)
Core 3
Core References
Patch, Vendor Advisory x_refsource_confirm
https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
Scores
CVSS v3
9.8
EPSS
0.0028
EPSS Percentile
51.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-416
Status
published
Products (1)
teluu/pjsip
< 2.13.1
Published
Oct 06, 2023
Tracked Since
Feb 18, 2026