res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.
2022-08-30T07:15:07.417
2024-11-21T06:34:47.440
Modified
CVSSv3.1: 6.5 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | asterisk | certified_asterisk | 16.8.0 | Yes |
Application | asterisk | certified_asterisk | 16.8.0 | Yes |
Application | asterisk | certified_asterisk | 16.8.0 | Yes |
Application | asterisk | certified_asterisk | 16.8.0 | Yes |
Application | asterisk | certified_asterisk | 16.8.0 | Yes |
Application | asterisk | certified_asterisk | 16.8.0 | Yes |
Application | asterisk | certified_asterisk | 16.8.0 | Yes |
Application | digium | asterisk | < 16.16.2 | Yes |
Application | digium | asterisk | < 17.9.3 | Yes |
Application | digium | asterisk | < 18.2.2 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | debian | debian_linux | 11.0 | Yes |