vulnerability
Alpine Linux: CVE-2019-13161: NULL Pointer Dereference
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:N/AC:M/Au:S/C:N/I:N/A:P) | Jul 12, 2019 | Jan 2, 2020 | Oct 1, 2024 |
Severity
3
CVSS
(AV:N/AC:M/Au:S/C:N/I:N/A:P)
Published
Jul 12, 2019
Added
Jan 2, 2020
Modified
Oct 1, 2024
Description
An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).
Solution
alpine-linux-upgrade-asterisk

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.