An issue was discovered in PJSIP in Asterisk before 16.19.1 and before 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request.
References
| Link | Resource |
|---|---|
| http://downloads.asterisk.org/pub/security/AST-2021-007.html | Patch Vendor Advisory |
| http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html | Patch Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2021/Jul/48 | Mailing List Patch Third Party Advisory |
| https://downloads.digium.com/pub/security/AST-2021-007.html | Patch Vendor Advisory |
| https://issues.asterisk.org/jira/browse/ASTERISK-29381 | Exploit Issue Tracking Vendor Advisory |
| http://downloads.asterisk.org/pub/security/AST-2021-007.html | Patch Vendor Advisory |
| http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html | Patch Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2021/Jul/48 | Mailing List Patch Third Party Advisory |
| https://downloads.digium.com/pub/security/AST-2021-007.html | Patch Vendor Advisory |
| https://issues.asterisk.org/jira/browse/ASTERISK-29381 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://downloads.asterisk.org/pub/security/AST-2021-007.html - Patch, Vendor Advisory | |
| References | () http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html - Patch, Third Party Advisory, VDB Entry | |
| References | () http://seclists.org/fulldisclosure/2021/Jul/48 - Mailing List, Patch, Third Party Advisory | |
| References | () https://downloads.digium.com/pub/security/AST-2021-007.html - Patch, Vendor Advisory | |
| References | () https://issues.asterisk.org/jira/browse/ASTERISK-29381 - Exploit, Issue Tracking, Vendor Advisory |
07 Aug 2021, 02:05
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
| CPE | cpe:2.3:a:digium:asterisk:18.4.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:16.18.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:18.3.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:16.17.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:18.5.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:16.19.0:*:*:*:*:*:*:* |
|
| CWE | CWE-617 | |
| References | (FULLDISC) http://seclists.org/fulldisclosure/2021/Jul/48 - Mailing List, Patch, Third Party Advisory | |
| References | (MISC) http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html - Patch, Third Party Advisory, VDB Entry | |
| References | (MISC) https://downloads.digium.com/pub/security/AST-2021-007.html - Patch, Vendor Advisory | |
| References | (MISC) https://issues.asterisk.org/jira/browse/ASTERISK-29381 - Exploit, Issue Tracking, Vendor Advisory | |
| References | (MISC) http://downloads.asterisk.org/pub/security/AST-2021-007.html - Patch, Vendor Advisory |
30 Jul 2021, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-07-30 14:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31878
Mitre link : CVE-2021-31878
CVE.ORG link : CVE-2021-31878
JSON object : View
Products Affected
digium
- asterisk
CWE
CWE-617
Reachable Assertion
