Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-15297 : Vulnerability Insights and Analysis

Learn about CVE-2019-15297, a vulnerability in Sangoma Asterisk versions 15.x and 16.x that allows attackers to crash the system by exploiting res_pjsip_t38. Find out how to mitigate and prevent this issue.

In Sangoma Asterisk versions 15.x prior to 15.7.4 and 16.x prior to 16.5.1, a vulnerability in res_pjsip_t38 allows attackers to trigger a crash by exploiting a declined stream response to a T.38 re-invite initiated by Asterisk.

Understanding CVE-2019-15297

This CVE involves a vulnerability in Sangoma Asterisk versions that could lead to a crash when specific actions are taken by an attacker.

What is CVE-2019-15297?

In Sangoma Asterisk versions 15.x before 15.7.4 and 16.x before 16.5.1, a flaw in res_pjsip_t38 can be exploited by sending a declined stream in response to a T.38 re-invite initiated by Asterisk, potentially causing a crash due to a NULL session media object dereference.

The Impact of CVE-2019-15297

Exploiting this vulnerability could result in a crash of the system, affecting the availability and stability of the affected Asterisk versions.

Technical Details of CVE-2019-15297

This section provides more in-depth technical details about the vulnerability.

Vulnerability Description

The vulnerability in res_pjsip_t38 in Sangoma Asterisk versions allows an attacker to crash the system by sending a declined stream in response to a T.38 re-invite initiated by Asterisk due to a NULL session media object dereference.

Affected Systems and Versions

        Sangoma Asterisk versions 15.x before 15.7.4
        Sangoma Asterisk versions 16.x before 16.5.1

Exploitation Mechanism

Attackers can exploit this vulnerability by sending a declined stream as a response to a T.38 re-invite initiated by Asterisk, leading to a crash due to the dereference of a NULL session media object.

Mitigation and Prevention

To address CVE-2019-15297, follow these mitigation and prevention strategies:

Immediate Steps to Take

        Update Sangoma Asterisk to versions 15.7.4 or 16.5.1, which contain fixes for this vulnerability.
        Monitor network traffic for any suspicious activity that could indicate exploitation of this vulnerability.

Long-Term Security Practices

        Regularly update and patch all software and systems to prevent known vulnerabilities from being exploited.
        Implement network segmentation and access controls to limit the impact of potential attacks.

Patching and Updates

        Apply the latest security patches and updates provided by Sangoma for Asterisk to ensure the system is protected against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now