respjsipt38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-NA"
},
{
"introduced": "16.0.0"
},
{
"fixed": "16.16.2"
},
{
"introduced": "17.0.0"
},
{
"fixed": "17.9.3"
},
{
"introduced": "18.0.0"
},
{
"fixed": "18.2.2"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
},
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.8.0-cert6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46837.json"