First published: Fri Nov 22 2019(Updated: )
An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digium Asterisk | >=13.0.0<=13.29.1 | |
Digium Certified Asterisk | =13.21 | |
Digium Certified Asterisk | =13.21-cert1 | |
Digium Certified Asterisk | =13.21-cert2 | |
Digium Certified Asterisk | =13.21-cert3 | |
Digium Certified Asterisk | =13.21-cert4 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18976 is a vulnerability in Sangoma Asterisk and Certified Asterisk that allows for a NULL pointer dereference and crash.
Digium Asterisk versions between 13.0.0 and 13.29.1 are affected by CVE-2019-18976.
Digium Certified Asterisk version 13.21, as well as its certified subversions (cert1, cert2, cert3, and cert4), are affected by CVE-2019-18976.
CVE-2019-18976 has a severity score of 7.5 (High).
To fix CVE-2019-18976, it is recommended to update Sangoma Asterisk to versions beyond 13.x and Certified Asterisk to versions beyond 13.21-x.