An issue was discovered in PJSIP in Asterisk before 16.19.1 and before 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request.
References
Link | Resource |
---|---|
http://downloads.asterisk.org/pub/security/AST-2021-007.html | Patch Vendor Advisory |
http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html | Patch Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Jul/48 | Mailing List Patch Third Party Advisory |
https://downloads.digium.com/pub/security/AST-2021-007.html | Patch Vendor Advisory |
https://issues.asterisk.org/jira/browse/ASTERISK-29381 | Exploit Issue Tracking Vendor Advisory |
http://downloads.asterisk.org/pub/security/AST-2021-007.html | Patch Vendor Advisory |
http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html | Patch Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Jul/48 | Mailing List Patch Third Party Advisory |
https://downloads.digium.com/pub/security/AST-2021-007.html | Patch Vendor Advisory |
https://issues.asterisk.org/jira/browse/ASTERISK-29381 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.asterisk.org/pub/security/AST-2021-007.html - Patch, Vendor Advisory | |
References | () http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html - Patch, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2021/Jul/48 - Mailing List, Patch, Third Party Advisory | |
References | () https://downloads.digium.com/pub/security/AST-2021-007.html - Patch, Vendor Advisory | |
References | () https://issues.asterisk.org/jira/browse/ASTERISK-29381 - Exploit, Issue Tracking, Vendor Advisory |
07 Aug 2021, 02:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
CPE | cpe:2.3:a:digium:asterisk:18.4.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:16.18.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:18.3.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:16.17.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:18.5.0:*:*:*:*:*:*:* cpe:2.3:a:digium:asterisk:16.19.0:*:*:*:*:*:*:* |
|
CWE | CWE-617 | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2021/Jul/48 - Mailing List, Patch, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html - Patch, Third Party Advisory, VDB Entry | |
References | (MISC) https://downloads.digium.com/pub/security/AST-2021-007.html - Patch, Vendor Advisory | |
References | (MISC) https://issues.asterisk.org/jira/browse/ASTERISK-29381 - Exploit, Issue Tracking, Vendor Advisory | |
References | (MISC) http://downloads.asterisk.org/pub/security/AST-2021-007.html - Patch, Vendor Advisory |
30 Jul 2021, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-30 14:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31878
Mitre link : CVE-2021-31878
CVE.ORG link : CVE-2021-31878
JSON object : View
Products Affected
digium
- asterisk
CWE
CWE-617
Reachable Assertion