Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-46837


res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.


Published

2022-08-30T07:15:07.417

Last Modified

2024-11-21T06:34:47.440

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-476

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application asterisk certified_asterisk 16.8.0 Yes
Application asterisk certified_asterisk 16.8.0 Yes
Application asterisk certified_asterisk 16.8.0 Yes
Application asterisk certified_asterisk 16.8.0 Yes
Application asterisk certified_asterisk 16.8.0 Yes
Application asterisk certified_asterisk 16.8.0 Yes
Application asterisk certified_asterisk 16.8.0 Yes
Application digium asterisk < 16.16.2 Yes
Application digium asterisk < 17.9.3 Yes
Application digium asterisk < 18.2.2 Yes
Operating System debian debian_linux 9.0 Yes
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes

References