CVE Vulnerabilities

CVE-2021-26906

Improper Resource Shutdown or Release

Published: Feb 18, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSIP allows a remote server to potentially crash Asterisk by sending specific SIP responses that cause an SDP negotiation failure.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
AsteriskDigium13.0.0 (including)13.38.2 (excluding)
AsteriskDigium16.0.0 (including)16.16.1 (excluding)
AsteriskDigium17.0.0 (including)17.9.2 (excluding)
AsteriskDigium18.0 (including)18.2.1 (excluding)
Certified_asteriskDigium16.8 (including)16.8 (including)
Certified_asteriskDigium16.8-cert1-rc1 (including)16.8-cert1-rc1 (including)
Certified_asteriskDigium16.8-cert1-rc2 (including)16.8-cert1-rc2 (including)
Certified_asteriskDigium16.8-cert1-rc3 (including)16.8-cert1-rc3 (including)
Certified_asteriskDigium16.8-cert1-rc4 (including)16.8-cert1-rc4 (including)
Certified_asteriskDigium16.8-cert2 (including)16.8-cert2 (including)
Certified_asteriskDigium16.8-cert3 (including)16.8-cert3 (including)
Certified_asteriskDigium16.8-cert4 (including)16.8-cert4 (including)
Certified_asteriskDigium16.8-cert4-rc1 (including)16.8-cert4-rc1 (including)
Certified_asteriskDigium16.8-cert4-rc2 (including)16.8-cert4-rc2 (including)
Certified_asteriskDigium16.8-cert4-rc3 (including)16.8-cert4-rc3 (including)
Certified_asteriskDigium16.8-cert4-rc4 (including)16.8-cert4-rc4 (including)
Certified_asteriskDigium16.8-cert5 (including)16.8-cert5 (including)
AsteriskUbuntutrusty*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References