NA

CVE-2021-46837

Published: 30/08/2022 Updated: 28/01/2023
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

res_pjsip_t38 in Sangoma Asterisk 16.x prior to 16.16.2, 17.x prior to 17.9.3, and 18.x prior to 18.2.2, and Certified Asterisk prior to 16.8-cert7, allows an malicious user to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

asterisk certified asterisk 16.8.0

digium asterisk

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1018073 asterisk: CVE-2021-46837 AST-2021-006 crash when receiving m=image 0 udptl t38 re-invite fixed in 16162 Package: asterisk; Maintainer for asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Source for asterisk is src:asterisk (PTS, buildd, popcon) Reported by: Beno ...
Multiple security vulnerabilities have been found in Asterisk, an Open Source Private Branch Exchange Buffer overflows and other programming errors could be exploited for information disclosure or the execution of arbitrary code Special care should be taken when upgrading to this new upstream release Some configuration files and options have cha ...