// For flags

CVE-2021-46837

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.

La función res_pjsip_t38 en Sangoma Asterisk versiones 16.x anteriores a 16.16.2, 17.x anteriores a 17.9.3, y 18.x anteriores a 18.2.2, y Certified Asterisk anteriores a 16.8-cert7, permite a un atacante desencadenar un fallo mediante el envío de una línea m=image y un puerto cero en una respuesta a una Re invitación T.38 iniciada por Asterisk. Se trata de una reaparición de los síntomas de la CVE-2019-15297 pero no exactamente por el mismo motivo. El fallo es producido porque se presenta una operación de append relativa a la topología activa, pero debería ser en cambio una operación de replace

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-08-30 CVE Reserved
  • 2022-08-30 CVE Published
  • 2024-07-16 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
-
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert1
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert2
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert3
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert4
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert5
Affected
Asterisk
Search vendor "Asterisk"
Certified Asterisk
Search vendor "Asterisk" for product "Certified Asterisk"
16.8.0
Search vendor "Asterisk" for product "Certified Asterisk" and version "16.8.0"
cert6
Affected
Digium
Search vendor "Digium"
Asterisk
Search vendor "Digium" for product "Asterisk"
>= 16.0.0 < 16.16.2
Search vendor "Digium" for product "Asterisk" and version " >= 16.0.0 < 16.16.2"
-
Affected
Digium
Search vendor "Digium"
Asterisk
Search vendor "Digium" for product "Asterisk"
>= 17.0.0 < 17.9.3
Search vendor "Digium" for product "Asterisk" and version " >= 17.0.0 < 17.9.3"
-
Affected
Digium
Search vendor "Digium"
Asterisk
Search vendor "Digium" for product "Asterisk"
>= 18.0.0 < 18.2.2
Search vendor "Digium" for product "Asterisk" and version " >= 18.0.0 < 18.2.2"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
11.0
Search vendor "Debian" for product "Debian Linux" and version "11.0"
-
Affected