similar to: AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability

Displaying 20 results from an estimated 4000 matches similar to: "AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability"

2015 Jan 28
0
AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
Asterisk Project Security Advisory - AST-2015-002 Product Asterisk Summary Mitigation for libcURL HTTP request injection vulnerability Nature of Advisory HTTP request injection Susceptibility Remote
2015 Jan 28
0
Asterisk 1.8.28-cert4, 1.8.32.2, 11.6-cert10, 11.15.1, 12.8.1, 13.1.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28.cert-4, 1.8.32.2, 11.6-cert10, 11.15.1, 12.8.1, and 13.1.1. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The release of these
2015 Jan 28
0
Asterisk 1.8.28-cert4, 1.8.32.2, 11.6-cert10, 11.15.1, 12.8.1, 13.1.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28.cert-4, 1.8.32.2, 11.6-cert10, 11.15.1, 12.8.1, and 13.1.1. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The release of these
2015 Jan 28
0
AST-2015-001: File descriptor leak when incompatible codecs are offered
Asterisk Project Security Advisory - AST-2015-001 Product Asterisk Summary File descriptor leak when incompatible codecs are offered Nature of Advisory Resource exhaustion Susceptibility Remote
2015 Jan 28
0
AST-2015-001: File descriptor leak when incompatible codecs are offered
Asterisk Project Security Advisory - AST-2015-001 Product Asterisk Summary File descriptor leak when incompatible codecs are offered Nature of Advisory Resource exhaustion Susceptibility Remote
2014 Nov 21
0
AST-2014-012: Mixed IP address families in access control lists may permit unwanted traffic.
Asterisk Project Security Advisory - AST-2014-012 Product Asterisk Summary Mixed IP address families in access control lists may permit unwanted traffic. Nature of Advisory Unauthorized Access Susceptibility Remote
2014 Nov 21
0
AST-2014-012: Mixed IP address families in access control lists may permit unwanted traffic.
Asterisk Project Security Advisory - AST-2014-012 Product Asterisk Summary Mixed IP address families in access control lists may permit unwanted traffic. Nature of Advisory Unauthorized Access Susceptibility Remote
2016 Feb 04
0
AST-2016-002: File descriptor exhaustion in chan_sip
Asterisk Project Security Advisory - AST-2016-002 Product Asterisk Summary File descriptor exhaustion in chan_sip Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Minor
2014 Oct 20
0
AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
Asterisk Project Security Advisory - AST-2014-011 Product Asterisk Summary Asterisk Susceptibility to POODLE Vulnerability Nature of Advisory Unauthorized Data Disclosure Susceptibility Remote Unauthenticated Sessions Severity Medium
2014 Oct 20
0
AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
Asterisk Project Security Advisory - AST-2014-011 Product Asterisk Summary Asterisk Susceptibility to POODLE Vulnerability Nature of Advisory Unauthorized Data Disclosure Susceptibility Remote Unauthenticated Sessions Severity Medium
2016 Feb 04
0
AST-2016-003: Remote crash vulnerability when receiving UDPTL FAX data.
Asterisk Project Security Advisory - AST-2016-003 Product Asterisk Summary Remote crash vulnerability when receiving UDPTL FAX data. Nature of Advisory Denial of Service Susceptibility Remote
2016 Feb 04
0
AST-2016-001: BEAST vulnerability in HTTP server
Asterisk Project Security Advisory - AST-2016-001 Product Asterisk Summary BEAST vulnerability in HTTP server Nature of Advisory Unauthorized data disclosure due to man-in-the-middle attack Susceptibility Remote
2015 Feb 01
0
libcurl support and curlGetHeaders warning message in R CMD check
On 27.01.2015 22:09, Skye Bender-deMoll wrote: > Dear R devel, > > Is libcurl support required to run R.devel, or is it optional? > > I'm compiling R.devel on an older Debian machine that only has libcurl > version 7.21.0 > > The R news file says > > " > Sun, 25 Jan 2015 > CHANGES IN R-devel NEW FEATURES > > Optional use of ?libcurl?
2015 Nov 05
0
Install R on Ubuntu with libcurl support
On 5 November 2015 at 11:44, Michael Coyne wrote: | What do you have installed as far as libcurl goes? Would you mind | listing your packages and greping for libcurl entries. The distribution works with proper dependencies. When R is built with libcurl, the R package already depends on libcurl: edd at max:~$ dpkg -s r-base-core | grep curl Depends: zip, unzip, libpaper-utils, xdg-utils, libblas3
2015 Nov 05
0
Install R on Ubuntu with libcurl support
The one strange thing I am now noticing is that precise does not have libcurl listed as a dependency. If you go to https://cran.r-project.org/bin/linux/ubuntu/precise/Packages and look for "libcurl" it is not listed. The other Ubuntu builds, such as trusty or wily do list it. On Thu, Nov 5, 2015 at 12:01 PM, Michael Coyne <mikeycgto at gmail.com> wrote: > Thanks for the advice.
2015 Jan 27
2
libcurl support and curlGetHeaders warning message in R CMD check
Dear R devel, Is libcurl support required to run R.devel, or is it optional? I'm compiling R.devel on an older Debian machine that only has libcurl version 7.21.0 The R news file says " Sun, 25 Jan 2015 CHANGES IN R-devel NEW FEATURES Optional use of ?libcurl? (version 7.28.0 from Oct 2012 or later) for Internet access (including on Windows): ... CHANGES IN R-devel
2004 Aug 06
1
libcurl error
I'm trying to upgrade my version of icecast to version 2 from CVS but am getting an error on autogen: checking for libcurl... no *** Could not run libcurl test program, checking why... *** The test program failed to compile or link. See the file config.log for the *** exact error that occured. This usually means libcurl was incorrectly installed *** or that you have moved libcurl since it was
2015 Apr 08
0
AST-2015-003: TLS Certificate Common name NULL byte exploit
Asterisk Project Security Advisory - AST-2015-003 Product Asterisk Summary TLS Certificate Common name NULL byte exploit Nature of Advisory Man in the Middle Attack Susceptibility Remote Authenticated Sessions Severity Major
2015 Apr 08
0
AST-2015-003: TLS Certificate Common name NULL byte exploit
Asterisk Project Security Advisory - AST-2015-003 Product Asterisk Summary TLS Certificate Common name NULL byte exploit Nature of Advisory Man in the Middle Attack Susceptibility Remote Authenticated Sessions Severity Major
2015 Aug 25
0
Issues with libcurl + HTTP status codes (eg. 403, 404)
On 08/25/2015 12:54 PM, Kevin Ushey wrote: > Hi all, > > The following fails for me (on OS X, although I imagine it's the same > on other platforms using libcurl): > > options(download.file.method = "libcurl") > options(repos = c(CRAN = "https://cran.rstudio.com/", CRANextra = > "http://www.stats.ox.ac.uk/pub/RWin")) >