Learn about CVE-2019-15297, a vulnerability in Sangoma Asterisk versions 15.x and 16.x that allows attackers to crash the system by exploiting res_pjsip_t38. Find out how to mitigate and prevent this issue.
In Sangoma Asterisk versions 15.x prior to 15.7.4 and 16.x prior to 16.5.1, a vulnerability in res_pjsip_t38 allows attackers to trigger a crash by exploiting a declined stream response to a T.38 re-invite initiated by Asterisk.
Understanding CVE-2019-15297
This CVE involves a vulnerability in Sangoma Asterisk versions that could lead to a crash when specific actions are taken by an attacker.
What is CVE-2019-15297?
In Sangoma Asterisk versions 15.x before 15.7.4 and 16.x before 16.5.1, a flaw in res_pjsip_t38 can be exploited by sending a declined stream in response to a T.38 re-invite initiated by Asterisk, potentially causing a crash due to a NULL session media object dereference.
The Impact of CVE-2019-15297
Exploiting this vulnerability could result in a crash of the system, affecting the availability and stability of the affected Asterisk versions.
Technical Details of CVE-2019-15297
This section provides more in-depth technical details about the vulnerability.
Vulnerability Description
The vulnerability in res_pjsip_t38 in Sangoma Asterisk versions allows an attacker to crash the system by sending a declined stream in response to a T.38 re-invite initiated by Asterisk due to a NULL session media object dereference.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by sending a declined stream as a response to a T.38 re-invite initiated by Asterisk, leading to a crash due to the dereference of a NULL session media object.
Mitigation and Prevention
To address CVE-2019-15297, follow these mitigation and prevention strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates