Total vulnerabilities in the database
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.
Software | From | Fixed in |
---|---|---|
asterisk / certified_asterisk | 16.8.0-cert6 | 16.8.0-cert6.x |
asterisk / certified_asterisk | 16.8.0-cert5 | 16.8.0-cert5.x |
asterisk / certified_asterisk | 16.8.0-cert4 | 16.8.0-cert4.x |
asterisk / certified_asterisk | 16.8.0-cert3 | 16.8.0-cert3.x |
asterisk / certified_asterisk | 16.8.0-cert2 | 16.8.0-cert2.x |
asterisk / certified_asterisk | 16.8.0-cert1 | 16.8.0-cert1.x |
digium / asterisk | 18.0.0 | 18.2.2 |
digium / asterisk | 17.0.0 | 17.9.3 |
digium / asterisk | 16.0.0 | 16.16.2 |
asterisk / certified_asterisk | 16.8.0 | 16.8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
debian / debian_linux | 11.0 | 11.0.x |