Displaying 20 results from an estimated 1000 matches similar to: "RTP suppress during calls - Asterisk 1.8.*"
2014 Mar 10
0
Asterisk 1.8.15-cert5, 1.8.26.1, 11.6-cert2, 11.8.1, 12.1.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security
releases are released as versions 1.8.15-cert5, 11.6-cert2, 1.8.26.1, 11.8.1,
and 12.1.1.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these versions resolve
2014 Mar 10
0
Asterisk 1.8.15-cert5, 1.8.26.1, 11.6-cert2, 11.8.1, 12.1.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security
releases are released as versions 1.8.15-cert5, 11.6-cert2, 1.8.26.1, 11.8.1,
and 12.1.1.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these versions resolve
2015 Mar 21
1
RTP sent to remote internal IP
Hello List,
I need your advise please.
I am trying to establish a call from Asterisk 1.8.15-cert5 to one remote SIP
UA (not Asterisk), both are behind NAT. That remote peer is configured with
nat=yes in my sip.conf but yet RTP packets are being sent to its internal IP
address which is declared in the Connection Information (c) in the SDP,
obviously reaching nowhere. I need RTP to be sent to the
2015 Mar 14
0
RTP sent to internal IP
Hello List,
I need your advise please.
I am trying to establish a call from Asterisk 1.8.15-cert5 to one remote SIP
UA (not Asterisk), both are behind NAT. That remote peer is configured with
nat=yes in my sip.conf but yet RTP packets are being sent to its internal IP
address which is declared in the Connection Information (c) in the SDP,
obviously reaching nowhere. I need RTP to be sent to the
2014 May 24
1
"transmit_silence" not properly recognized on 1.8 ?
Hello,
I've got a problem at the moment, that setting "transmit_silence = yes"
seems to have no effect on Asterisk 1.8-Certified.
Although it's enabled and "core show settings" confirms, that it is
really enabled, there are no RTP packets sent by Asterisk when waiting
for DMTF input or when "Wait()" is called.
Also, there seems to be a small gap of 2 or 3
2014 Mar 10
0
AST-2014-002: Denial of Service Through File Descriptor Exhaustion with chan_sip Session-Timers
Asterisk Project Security Advisory - AST-2014-002
Product Asterisk
Summary Denial of Service Through File Descriptor Exhaustion
with chan_sip Session-Timers
Nature of Advisory Denial of Service
Susceptibility Remote
2014 Mar 10
0
AST-2014-002: Denial of Service Through File Descriptor Exhaustion with chan_sip Session-Timers
Asterisk Project Security Advisory - AST-2014-002
Product Asterisk
Summary Denial of Service Through File Descriptor Exhaustion
with chan_sip Session-Timers
Nature of Advisory Denial of Service
Susceptibility Remote
2014 Mar 10
0
AST-2014-001: Stack Overflow in HTTP Processing of Cookie Headers.
Asterisk Project Security Advisory - AST-2014-001
Product Asterisk
Summary Stack Overflow in HTTP Processing of Cookie Headers.
Nature of Advisory Denial Of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2014 Mar 10
0
AST-2014-001: Stack Overflow in HTTP Processing of Cookie Headers.
Asterisk Project Security Advisory - AST-2014-001
Product Asterisk
Summary Stack Overflow in HTTP Processing of Cookie Headers.
Nature of Advisory Denial Of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2023 Jul 07
0
Asterisk Release certified-18.9-cert5
The Asterisk Development Team would like to announce security release
Certified Asterisk 18.9-cert5.
The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/certified-18.9-cert5
and
https://downloads.asterisk.org/pub/telephony/certified-asterisk
The following security advisories were resolved in this release:
2023 Jul 07
0
Asterisk Release certified-18.9-cert5
The Asterisk Development Team would like to announce security release
Certified Asterisk 18.9-cert5.
The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/certified-18.9-cert5
and
https://downloads.asterisk.org/pub/telephony/certified-asterisk
The following security advisories were resolved in this release:
2017 Aug 31
0
AST-2017-005: Media takeover in RTP stack
Asterisk Project Security Advisory - AST-2017-005
Product Asterisk
Summary Media takeover in RTP stack
Nature of Advisory Unauthorized data disclosure
Susceptibility Remote Unauthenticated Sessions
Severity Critical
2014 Sep 06
0
Certified Asterisk 11.6-cert5 Now Available
The Asterisk Development Team is pleased to announce the release of
Certified Asterisk 11.6-cert5. This release is available for immediate download
at http://downloads.asterisk.org/pub/telephony/certified-asterisk/releases
For a full list of changes in this release, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/certified-asterisk/ChangeLog-11.6-cert5
Thank you for your
2019 Nov 21
0
Asterisk 13.29.2, 16.6.2, 17.0.1 and 13.21-cert5 Now Available (Security)
The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16 and 17, and Certified Asterisk 13.21. The available releases are
released as versions 13.29.2, 16.6.2, 17.0.1 and 13.21-cert5.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
2020 Nov 05
0
Asterisk 13.37.1, 16.14.1, 17.8.1, 18.0.1 and 16.8-cert5 Now Available (Security)
The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.37.1, 16.14.1, 17.8.1, 18.0.1 and 16.8-cert5.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
2015 Apr 08
0
Asterisk 1.8.28-cert5, 1.8.32.3, 11.6-cert11, 11.17.1, 12.8.2, 13.1-cert2, 13.3.2 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.28, 11.6, and 13.1 and Asterisk 1.8, 11, 12, and 13. The available
security releases are released as versions 1.8.28.cert-5, 1.8.32.3, 11.6-cert11,
11.17.1, 12.8.2, 13.1-cert2, and 13.3.2.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The
2015 Apr 08
0
Asterisk 1.8.28-cert5, 1.8.32.3, 11.6-cert11, 11.17.1, 12.8.2, 13.1-cert2, 13.3.2 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.28, 11.6, and 13.1 and Asterisk 1.8, 11, 12, and 13. The available
security releases are released as versions 1.8.28.cert-5, 1.8.32.3, 11.6-cert11,
11.17.1, 12.8.2, 13.1-cert2, and 13.3.2.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The
2019 Nov 21
0
AST-2019-007: AMI user could execute system commands.
Asterisk Project Security Advisory - AST-2019-007
Product Asterisk
Summary AMI user could execute system commands.
Nature of Advisory Remote Code Execution
Susceptibility Remote Authenticated Sessions
Severity Minor
2019 Nov 21
0
AST-2019-008: Re-invite with T.38 and malformed SDP causes crash.
Asterisk Project Security Advisory -
Product Asterisk
Summary Re-invite with T.38 and malformed SDP causes crash.
Nature of Advisory Remote Crash
Susceptibility Remote Authenticated Sessions
Severity Minor
2020 Nov 05
0
AST-2020-002: Outbound INVITE loop on challenge with different nonce.
Asterisk Project Security Advisory – AST-2020-002
Product Asterisk
Summary Outbound INVITE loop on challenge with different
nonce.
Nature of Advisory Denial of Service
Susceptibility Remote