299,184
Total vulnerabilities in the database
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.
| Software | From | Fixed in |
|---|---|---|
| asterisk / certified_asterisk | 16.8.0-cert6 | 16.8.0-cert6.x |
| asterisk / certified_asterisk | 16.8.0-cert5 | 16.8.0-cert5.x |
| asterisk / certified_asterisk | 16.8.0-cert4 | 16.8.0-cert4.x |
| asterisk / certified_asterisk | 16.8.0-cert3 | 16.8.0-cert3.x |
| asterisk / certified_asterisk | 16.8.0-cert2 | 16.8.0-cert2.x |
| asterisk / certified_asterisk | 16.8.0-cert1 | 16.8.0-cert1.x |
| digium / asterisk | 18.0.0 | 18.2.2 |
| digium / asterisk | 17.0.0 | 17.9.3 |
| digium / asterisk | 16.0.0 | 16.16.2 |
| asterisk / certified_asterisk | 16.8.0 | 16.8.0.x |
| debian / debian_linux | 9.0 | 9.0.x |
| debian / debian_linux | 10.0 | 10.0.x |
| debian / debian_linux | 11.0 | 11.0.x |