Aug. 30, 2022, 7:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace …

asterisk cve

Principal Engineer - DLP Endpoint Security

@ Netskope | Bengaluru, Karnataka, India

Security Consultant (m/w/d)

@ Deutsche Telekom | Berlin, Deutschland

Security Engineer

@ IDEMIA | Haarlem, NL, 2031 CC

CyberSecurity Forensics and Incident Response Analyst

@ Bosch Group | Pittsburgh, PA, United States

Cyber MS MDR - Sr Associate

@ KPMG India | Bengaluru, Karnataka, India

Senior Lead Cybersecurity Architect-Threat modeling, Cryptography

@ JPMorgan Chase & Co. | India