An issue was discovered in PJSIP in Asterisk before 16.19.1 and before 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2021/Jul/48 | mailing list third party advisory patch |
http://packetstormsecurity.com/files/163638/Asterisk-Project-Security-Advisory-AST-2021-007.html | vdb entry third party advisory patch |
http://downloads.asterisk.org/pub/security/AST-2021-007.html | patch vendor advisory |
https://issues.asterisk.org/jira/browse/ASTERISK-29381 | issue tracking exploit vendor advisory |
https://downloads.digium.com/pub/security/AST-2021-007.html | patch vendor advisory |