An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chansip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chansip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-config" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-dahdi" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-dahdi-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-dev" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-doc" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-mobile" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-mobile-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-modules" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-modules-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-mp3" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-mp3-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-mysql" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-mysql-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-ooh323" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-ooh323-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-tests" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-tests-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-voicemail" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-voicemail-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-voicemail-imapstorage" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-voicemail-imapstorage-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-voicemail-odbcstorage" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-voicemail-odbcstorage-dbgsym" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-vpb" }, { "binary_version": "1:16.2.1~dfsg-2build2", "binary_name": "asterisk-vpb-dbgsym" } ] }