Bug#931981: asterisk: CVE-2019-13161: AST-2019-003: Remote Crash Vulnerability in chan_sip channel driver
Salvatore Bonaccorso
carnil at debian.org
Sat Jul 13 09:55:33 BST 2019
Package: asterisk
Version: 1:16.2.1~dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://issues.asterisk.org/jira/browse/ASTERISK-28465
Hi,
The following vulnerability was published for asterisk.
CVE-2019-13161[0]:
| An issue was discovered in Asterisk Open Source through 13.27.0, 14.x
| and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified
| Asterisk through 13.21-cert3. A pointer dereference in chan_sip while
| handling SDP negotiation allows an attacker to crash Asterisk when
| handling an SDP answer to an outgoing T.38 re-invite. To exploit this
| vulnerability an attacker must cause the chan_sip module to send a
| T.38 re-invite request to them. Upon receipt, the attacker must send
| an SDP answer containing both a T.38 UDPTL stream and another media
| stream containing only a codec (which is not permitted according to
| the chan_sip configuration).
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-13161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13161
[1] https://issues.asterisk.org/jira/browse/ASTERISK-28465
[2] https://downloads.asterisk.org/pub/security/AST-2019-003.html
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Pkg-voip-maintainers
mailing list