ID CVE-2021-26717
Summary An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would send both audio and T.38 in the SDP. If this happened, and the remote responded with a declined T.38 stream, then Asterisk would crash.
References
Vulnerable Configurations
  • cpe:2.3:a:digium:asterisk:16.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*
  • cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*
    cpe:2.3:a:digium:certified_asterisk:16.8:cert5:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 24-02-2021 - 17:34)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
Last major update 24-02-2021 - 17:34
Published 18-02-2021 - 20:15
Last modified 24-02-2021 - 17:34
Back to Top