CVE-2021-46837
30.08.2022, 07:15
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.Enginsight
Vendor | Product | Version |
---|---|---|
asterisk | certified_asterisk | 16.8.0 |
asterisk | certified_asterisk | 16.8.0:cert1 |
asterisk | certified_asterisk | 16.8.0:cert2 |
asterisk | certified_asterisk | 16.8.0:cert3 |
asterisk | certified_asterisk | 16.8.0:cert4 |
asterisk | certified_asterisk | 16.8.0:cert5 |
asterisk | certified_asterisk | 16.8.0:cert6 |
digium | asterisk | 16.0.0 ≤ 𝑥 < 16.16.2 |
digium | asterisk | 17.0.0 ≤ 𝑥 < 17.9.3 |
digium | asterisk | 18.0.0 ≤ 𝑥 < 18.2.2 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References