search for: voipsa

Displaying 8 results from an estimated 8 matches for "voipsa".

Did you mean: voipas
2007 Mar 21
0
Asterisk 1.2.17 Released
The Asterisk and Zaptel development teams have released Asterisk version 1.2.17. Along with minor bug fixes, this release incorporates a fix for the SIP DoS vulnerability recently discovered by INRIA Lorraine (http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html). All users of Asterisk 1.2 with the SIP channel driver loaded and connected to an untrusted network are urged to update to this release to avoid the possibility of experiencing this problem. Thanks for your support of Asterisk and Zaptel!
2007 Mar 21
0
Asterisk 1.4.2 Released
...DTMF handling in the IAX2 channel driver There are also two security-related changes in this version: - a fix for a SIP channel driver remote DoS vulnerability (http://bugs.digium.com/view.php?id=9313) - a fix for a SIP channel driver remote DoS vulnerability discovered by INRIA Lorraine (http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html) All users of Asterisk 1.4 with the SIP channel driver loaded and connected to an untrusted network are urged to update to this release to avoid the possibility of experiencing these problems. Thanks for your support of Asterisk and Zaptel!
2007 Mar 21
0
Asterisk 1.2.17 Released
The Asterisk and Zaptel development teams have released Asterisk version 1.2.17. Along with minor bug fixes, this release incorporates a fix for the SIP DoS vulnerability recently discovered by INRIA Lorraine (http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html). All users of Asterisk 1.2 with the SIP channel driver loaded and connected to an untrusted network are urged to update to this release to avoid the possibility of experiencing this problem. Thanks for your support of Asterisk and Zaptel!
2007 Mar 21
0
Asterisk 1.4.2 Released
...DTMF handling in the IAX2 channel driver There are also two security-related changes in this version: - a fix for a SIP channel driver remote DoS vulnerability (http://bugs.digium.com/view.php?id=9313) - a fix for a SIP channel driver remote DoS vulnerability discovered by INRIA Lorraine (http://voipsa.org/pipermail/voipsec_voipsa.org/2007-March/002275.html) All users of Asterisk 1.4 with the SIP channel driver loaded and connected to an untrusted network are urged to update to this release to avoid the possibility of experiencing these problems. Thanks for your support of Asterisk and Zaptel!
2006 Oct 28
0
Asteroid SIP Denial of Service Tool
...d Henning Schulzrinne for taking a look at the tool during his seminars at Columbia. Also thanks to Anthony LaMantia, Tzafir Cohen, and the others on the dev list for tolerating my posts. Public apologies to Jay R. Ashworth for my mis-reading of the "(Missed)Trust in Caller ID" thread on VOIPSA ;) Coming 10/31/2006 http://www.infiltrated.net/asteroid/ -- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo echo @infiltrated|sed 's/^/sil/g;s/$/.net/g' http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x1383A743 "How a man plays the game shows something of his...
2007 Apr 24
0
Asterisk Project Security Adivsory Process
...verity level for each advisory, so that end users can quickly determine which vulnerabilities they need to be concerned about. 5) We will post our security advisories to (at least) these mailing lists: - asterisk-security - asterisk-announce - asterisk-users - asterisk-dev - VOIPSEC (voipsec@voipsa.org) - bugtraq (bugtraq@securityfocus.com) - full-disclosure (full-disclosure@lists.grok.co.uk) - vulnwatch (vulnwatch@vulnwatch.org) 6) We will post and archive all our advisories on the asterisk.org website, and provide an RSS feed for those who wish to watch the advisory listing page with au...
2007 Apr 24
0
Asterisk Project Security Adivsory Process
...verity level for each advisory, so that end users can quickly determine which vulnerabilities they need to be concerned about. 5) We will post our security advisories to (at least) these mailing lists: - asterisk-security - asterisk-announce - asterisk-users - asterisk-dev - VOIPSEC (voipsec@voipsa.org) - bugtraq (bugtraq@securityfocus.com) - full-disclosure (full-disclosure@lists.grok.co.uk) - vulnwatch (vulnwatch@vulnwatch.org) 6) We will post and archive all our advisories on the asterisk.org website, and provide an RSS feed for those who wish to watch the advisory listing page with au...
2007 Dec 17
3
Trixbox Phones Home
I just read on Slashdot (at http://yro.slashdot.org/article.pl?sid=07/12/16/222243 ) that Trixbox "has been phoning home with statistics about their installations", as a Trixbox user exposed in "Trixbox Phones Home" at http://www.trixbox.org/forums/trixbox-forums/open-discussion/trixbox-phones-home . -- (C) Matthew Rubenstein