CVE-2019-13161

NameCVE-2019-13161
DescriptionAn issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow
Debian Bugs931981

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)jessie1:11.13.1~dfsg-2+deb8u5vulnerable
jessie (security)1:11.13.1~dfsg-2+deb8u8vulnerable
stretch (security), stretch1:13.14.1~dfsg-2+deb9u4vulnerable
buster1:16.2.1~dfsg-1+deb10u1fixed
bullseye, sid1:16.2.1~dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksource(unstable)1:16.2.1~dfsg-2low931981
asterisksourcebuster1:16.2.1~dfsg-1+deb10u1

Notes

[stretch] - asterisk <no-dsa> (Minor issue)
[jessie] - asterisk <postponed> (Minor issue)
http://downloads.digium.com/pub/security/AST-2019-003.html
https://issues.asterisk.org/jira/browse/ASTERISK-28465

Search for package or bug name: Reporting problems