Displaying 20 results from an estimated 20000 matches similar to: "Critical Updates: Asterisk 1.2.22 and 1.4.8 released"
2007 Jul 17
0
ASA-2007-016: Remote crash vulnerability in Skinny channel driver
Asterisk Project Security Advisory - ASA-2007-016
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Remote crash vulnerability in Skinny channel |
| | driver
2007 Jul 17
0
ASA-2007-016: Remote crash vulnerability in Skinny channel driver
Asterisk Project Security Advisory - ASA-2007-016
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Remote crash vulnerability in Skinny channel |
| | driver
2007 Jul 17
0
ASA-2007-014: Stack buffer overflow in IAX2 channel driver
Asterisk Project Security Advisory - ASA-2007-014
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | Stack buffer overflow in IAX2 channel driver |
2007 Jul 17
0
ASA-2007-014: Stack buffer overflow in IAX2 channel driver
Asterisk Project Security Advisory - ASA-2007-014
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | Stack buffer overflow in IAX2 channel driver |
2007 Jul 17
0
ASA-2007-015: Remote Crash Vulnerability in IAX2 channel driver
Asterisk Project Security Advisory - ASA-2007-015
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Remote Crash Vulnerability in IAX2 channel driver |
2007 Jul 17
0
ASA-2007-015: Remote Crash Vulnerability in IAX2 channel driver
Asterisk Project Security Advisory - ASA-2007-015
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Remote Crash Vulnerability in IAX2 channel driver |
2007 Jul 17
0
ASA-2007-017: Remote crash vulnerability in STUN implementation
Asterisk Project Security Advisory - ASA-2007-017
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Remote Crash Vulnerability in STUN implementation |
2007 Jul 17
0
ASA-2007-017: Remote crash vulnerability in STUN implementation
Asterisk Project Security Advisory - ASA-2007-017
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Remote Crash Vulnerability in STUN implementation |
2014 Nov 21
0
Asterisk 1.8.28-cert3, 1.8.32.1, 11.6-cert8, 11.14.1, 12.7.1, 13.0.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available
security releases are released as versions 1.8.28-cert3, 11.6-cert8, 1.8.32.1,
11.14.1, 12.7.1, and 13.0.1.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these
2014 Nov 21
0
Asterisk 1.8.28-cert3, 1.8.32.1, 11.6-cert8, 11.14.1, 12.7.1, 13.0.1 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available
security releases are released as versions 1.8.28-cert3, 11.6-cert8, 1.8.32.1,
11.14.1, 12.7.1, and 13.0.1.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of these
2007 May 04
1
ASA-2007-013: IAX2 users can cause unauthorized data disclosure
> Asterisk Project Security Advisory - ASA-2007-013
>
> +----------------------------------------------------------------------------------+
> | Product | Asterisk |
> |----------------------+-----------------------------------------------------------|
> | Summary | IAX2
2007 May 04
1
ASA-2007-013: IAX2 users can cause unauthorized data disclosure
> Asterisk Project Security Advisory - ASA-2007-013
>
> +----------------------------------------------------------------------------------+
> | Product | Asterisk |
> |----------------------+-----------------------------------------------------------|
> | Summary | IAX2
2012 Mar 26
0
Different result with "kruskal.test" and post-hoc analysis with Nemenyi-Damico-Wolfe-Dunn test implemented in the help page for oneway_test in the coin package that uses multcomp
Dear Researchers,
Sorry for this email but I am not a statistician, and for this I have this
problem to understand. Thanks in Advance for help and suggestions.
Gianni
I have 21 classes (00, 01, 02, 04, ....,020) with different length. I did a
kruskal wall test in R with the following code
kruskal.test(m.class.l, m.class.length.lf)
Kruskal-Wallis rank sum test
data: m.class.l and
2007 Aug 07
0
Asterisk 1.2.24 and 1.4.10 released
The Asterisk development team has released Asterisk versions 1.2.24 and 1.4.10.
Version 1.2.24 is the final 1.2 release that contains normal bug fixes. The 1.2
branch will only be maintained with security fix releases from now until it is
completely deprecated.
Version 1.4.10 contains numerous bug fixes for things all over Asterisk, as well
as a fix for a security issue. The security issue
2007 Aug 07
0
Asterisk 1.2.24 and 1.4.10 released
The Asterisk development team has released Asterisk versions 1.2.24 and 1.4.10.
Version 1.2.24 is the final 1.2 release that contains normal bug fixes. The 1.2
branch will only be maintained with security fix releases from now until it is
completely deprecated.
Version 1.4.10 contains numerous bug fixes for things all over Asterisk, as well
as a fix for a security issue. The security issue
2007 Apr 24
0
ASA-2007-010: Two stack buffer overflows in SIP channel's T.38 SDP parsing code
> Asterisk Project Security Advisory - ASA-2007-010
>
> +------------------------------------------------------------------------+
> | Product | Asterisk |
> |--------------------+---------------------------------------------------|
> | Summary | Two stack buffer overflows in SIP
2007 Apr 24
0
ASA-2007-010: Two stack buffer overflows in SIP channel's T.38 SDP parsing code
> Asterisk Project Security Advisory - ASA-2007-010
>
> +------------------------------------------------------------------------+
> | Product | Asterisk |
> |--------------------+---------------------------------------------------|
> | Summary | Two stack buffer overflows in SIP
2008 Jul 07
1
DTMF on iax channel is not interpreted by asterisk
Hi!
I'm using asterisk 1.4.17 with twinkle and a custom phone based on
iaxclient 2.0.2 and I'm struggling a bit with DTMF and features.conf.
While the twinkle client is able to initiate an attended transfer using
*2 (as configured in features.conf), the iax client is not. I can see
the DTMF messages showing up on the asterisk console, but asterisk does
not invoke the features
2007 Apr 24
0
Asterisk Project Security Adivsory Process
Recent events, including vulnerabilities that were reported and the
subsequent discussions about how they were handled, have made those of
us that manage Asterisk development decide that it is time for the
Asterisk project to have a formal security vulnerability and advisory
reporting process.
Over the next few weeks we will begin to formalize and document this
process on the asterisk.org
2007 Apr 24
0
Asterisk Project Security Adivsory Process
Recent events, including vulnerabilities that were reported and the
subsequent discussions about how they were handled, have made those of
us that manage Asterisk development decide that it is time for the
Asterisk project to have a formal security vulnerability and advisory
reporting process.
Over the next few weeks we will begin to formalize and document this
process on the asterisk.org