ID CVE-2021-46837
Summary res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.
References
Vulnerable Configurations
  • cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*
    cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*
    cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*
    cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*
    cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*
    cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*
    cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:18.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:18.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:17.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:17.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.3.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.3.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.4.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.4.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:digium:asterisk:16.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:digium:asterisk:16.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:asterisk:certified_asterisk:16.8.0:-:*:*:*:*:*:*
    cpe:2.3:a:asterisk:certified_asterisk:16.8.0:-:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 28-01-2023 - 01:20
Published 30-08-2022 - 07:15
Last modified 28-01-2023 - 01:20
Back to Top