Lucene search

K
cve[email protected]CVE-2021-46837
HistoryAug 30, 2022 - 7:15 a.m.

CVE-2021-46837

2022-08-3007:15:07
CWE-476
web.nvd.nist.gov
37
6
cve
2021
46837
sangoma asterisk
asterisk
security vulnerability
crash
t.38
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.3 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

79.2%

res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.

Affected configurations

NVD
Node
asteriskcertified_asteriskMatch16.8.0-
OR
asteriskcertified_asteriskMatch16.8.0cert1
OR
asteriskcertified_asteriskMatch16.8.0cert2
OR
asteriskcertified_asteriskMatch16.8.0cert3
OR
asteriskcertified_asteriskMatch16.8.0cert4
OR
asteriskcertified_asteriskMatch16.8.0cert5
OR
asteriskcertified_asteriskMatch16.8.0cert6
OR
digiumasteriskRange16.0.016.16.2
OR
digiumasteriskRange17.0.017.9.3
OR
digiumasteriskRange18.0.018.2.2
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0

Social References

More

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.3 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

79.2%