First published: Thu Aug 25 2022(Updated: )
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk Certified Asterisk | =16.8.0 | |
Asterisk Certified Asterisk | =16.8.0-cert1 | |
Asterisk Certified Asterisk | =16.8.0-cert2 | |
Asterisk Certified Asterisk | =16.8.0-cert3 | |
Asterisk Certified Asterisk | =16.8.0-cert4 | |
Asterisk Certified Asterisk | =16.8.0-cert5 | |
Asterisk Certified Asterisk | =16.8.0-cert6 | |
Digium Asterisk | >=16.0.0<16.16.2 | |
Digium Asterisk | >=17.0.0<17.9.3 | |
Digium Asterisk | >=18.0.0<18.2.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/asterisk | <=1:16.2.1~dfsg-1+deb10u2 | 1:16.28.0~dfsg-0+deb10u4 1:16.28.0~dfsg-0+deb11u3 1:20.5.2~dfsg+~cs6.13.40431414-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-46837 is medium with a severity value of 6.5.
CVE-2021-46837 affects Sangoma Asterisk versions 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7.
An attacker can trigger a crash with CVE-2021-46837 by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk.
The remedy for CVE-2021-46837 is to update to Sangoma Asterisk version 16.16.2, 17.9.3, 18.2.2, or Certified Asterisk version 16.8-cert7.
More information about CVE-2021-46837 can be found at the following references: https://downloads.asterisk.org/pub/security/AST-2021-006.html, https://security-tracker.debian.org/tracker/CVE-2021-46837, https://security-tracker.debian.org/tracker/CVE-2019-15297