Unknown
CVE-2019-13161
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-13161
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- digium
Products
- asterisk,
- certified asterisk 1.8.0.0,
- certified asterisk 1.8.1.0,
- certified asterisk 1.8.10.0,
- certified asterisk 1.8.11,
- certified asterisk 1.8.11.0,
- certified asterisk 1.8.12.0,
- certified asterisk 1.8.13.0,
- certified asterisk 1.8.14.0,
- certified asterisk 1.8.15,
- certified asterisk 1.8.2.0,
- certified asterisk 1.8.28,
- certified asterisk 1.8.28.0,
- certified asterisk 1.8.3.0,
- certified asterisk 1.8.4.0,
- certified asterisk 1.8.5.0,
- certified asterisk 1.8.6.0,
- certified asterisk 1.8.7.0,
- certified asterisk 1.8.8.0,
- certified asterisk 1.8.9.0,
- certified asterisk 11.0.0,
- certified asterisk 11.1.0,
- certified asterisk 11.2,
- certified asterisk 11.3.0,
- certified asterisk 11.4.0,
- certified asterisk 11.5.0,
- certified asterisk 11.6,
- certified asterisk 11.6.0,
- certified asterisk 13.1,
- certified asterisk 13.1.0,
- certified asterisk 13.13,
- certified asterisk 13.13-cert2,
- certified asterisk 13.18,
- certified asterisk 13.21,
- certified asterisk 13.8,
- certified asterisk 13.8.0,
- debian linux 8.0,
- debian linux 9.0
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: