Vulnerabilities > CVE-2019-18976 - NULL Pointer Dereference vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_PKG_94C6951A0D0411EA87CA001999F8D30B.NASL |
description | The Asterisk project reports : If Asterisk receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a crash will occur. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 131261 |
published | 2019-11-25 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/131261 |
title | FreeBSD : asterisk -- Re-invite with T.38 and malformed SDP causes crash (94c6951a-0d04-11ea-87ca-001999f8d30b) |
code |
|
References
- http://downloads.asterisk.org/pub/security/AST-2019-008.html
- http://downloads.asterisk.org/pub/security/AST-2019-008.html
- https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html
- https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html
- https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html
- https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html
- https://seclists.org/fulldisclosure/2019/Nov/20
- https://seclists.org/fulldisclosure/2019/Nov/20
- https://www.asterisk.org/downloads/security-advisories
- https://www.asterisk.org/downloads/security-advisories
- https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1
- https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1