similar to: ASA-2007-014: Stack buffer overflow in IAX2 channel driver

Displaying 20 results from an estimated 2000 matches similar to: "ASA-2007-014: Stack buffer overflow in IAX2 channel driver"

2007 Jul 17
0
ASA-2007-016: Remote crash vulnerability in Skinny channel driver
Asterisk Project Security Advisory - ASA-2007-016 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote crash vulnerability in Skinny channel | | | driver
2007 Jul 17
0
ASA-2007-016: Remote crash vulnerability in Skinny channel driver
Asterisk Project Security Advisory - ASA-2007-016 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote crash vulnerability in Skinny channel | | | driver
2007 Jul 17
0
ASA-2007-015: Remote Crash Vulnerability in IAX2 channel driver
Asterisk Project Security Advisory - ASA-2007-015 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote Crash Vulnerability in IAX2 channel driver |
2007 Jul 17
0
ASA-2007-015: Remote Crash Vulnerability in IAX2 channel driver
Asterisk Project Security Advisory - ASA-2007-015 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote Crash Vulnerability in IAX2 channel driver |
2007 Jul 17
0
ASA-2007-017: Remote crash vulnerability in STUN implementation
Asterisk Project Security Advisory - ASA-2007-017 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote Crash Vulnerability in STUN implementation |
2007 Jul 17
0
ASA-2007-017: Remote crash vulnerability in STUN implementation
Asterisk Project Security Advisory - ASA-2007-017 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote Crash Vulnerability in STUN implementation |
2007 Aug 21
0
AST-2007-020: Resource Exhaustion vulnerability in SIP channel driver
Asterisk Project Security Advisory - AST-2007-020 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Resource Exhaustion vulnerability in SIP channel | | | driver
2007 Aug 21
0
AST-2007-020: Resource Exhaustion vulnerability in SIP channel driver
Asterisk Project Security Advisory - AST-2007-020 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Resource Exhaustion vulnerability in SIP channel | | | driver
2009 Nov 04
0
AST-2009-008: SIP responses expose valid usernames
Asterisk Project Security Advisory - AST-2009-008 +------------------------------------------------------------------------+ | Product | Asterisk | |----------------------+-------------------------------------------------| | Summary | SIP responses expose valid usernames |
2005 Jan 28
3
chan_iax2.c problem?
Hi, I was messing around with FireFly last night and got asterisk to crash hard. It looks like the bug is a division by zero in chan_iax2.c. I reproduced it and here are some infos I got from gdb: [Switching to Thread 245775 (LWP 23251)] 0x41154918 in calc_timestamp (p=0x816b710, ts=0, f=0x424eef24) at chan_iax2.c:2896 2896 int diff = ms % (f->samples / 8);
2008 May 22
0
/home/putnopvut/asa/AST-2008-007/AST-2008-007: AST-2008-007 Cryptographic keys generated by OpenSSL on Debian-based systems compromised
Asterisk Project Security Advisory - AST-2008-007 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Asterisk installations using cryptographic keys | | | generated
2007 Jul 17
0
Critical Updates: Asterisk 1.2.22 and 1.4.8 released
The Asterisk development team has released Asterisk versions 1.2.22 and 1.4.8. These releases contain fixes for four critical security vulnerabilities. One of these vulnerabilities is a remotely exploitable stack buffer overflow, which could allow an attacker to execute arbitrary code on the target machine. The other three are all remotely exploitable crash vulnerabilities. We have released
2007 Jul 17
0
Critical Updates: Asterisk 1.2.22 and 1.4.8 released
The Asterisk development team has released Asterisk versions 1.2.22 and 1.4.8. These releases contain fixes for four critical security vulnerabilities. One of these vulnerabilities is a remotely exploitable stack buffer overflow, which could allow an attacker to execute arbitrary code on the target machine. The other three are all remotely exploitable crash vulnerabilities. We have released
2007 Aug 24
0
AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage
Asterisk Project Security Advisory - AST-2007-021 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Crash from invalid/corrupted MIME bodies when | | | using
2007 Aug 24
0
AST-2007-021: Crash from invalid/corrupted MIME bodies when using voicemail with IMAP storage
Asterisk Project Security Advisory - AST-2007-021 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Crash from invalid/corrupted MIME bodies when | | | using
2017 Dec 01
0
2018 ASA Computing/Graphics: Chambers Software Award and Student Paper Competition
Dear R-help Listers, The submission site for the two awards (Chambers Student Software; Computing/Graphics Student Paper) is open at http://asa.stat.uconn.edu<http://asa.stat.uconn.edu/> until the deadline, 5:00 pm EST, December 15, 2017. The results will be announced by January 15, 2018. The award recipients are expected to present in a topic-contributed session at the 2018 JSM in
2007 Apr 24
0
ASA-2007-010: Two stack buffer overflows in SIP channel's T.38 SDP parsing code
> Asterisk Project Security Advisory - ASA-2007-010 > > +------------------------------------------------------------------------+ > | Product | Asterisk | > |--------------------+---------------------------------------------------| > | Summary | Two stack buffer overflows in SIP
2007 Apr 24
0
ASA-2007-010: Two stack buffer overflows in SIP channel's T.38 SDP parsing code
> Asterisk Project Security Advisory - ASA-2007-010 > > +------------------------------------------------------------------------+ > | Product | Asterisk | > |--------------------+---------------------------------------------------| > | Summary | Two stack buffer overflows in SIP
2007 Apr 24
0
ASA-2007-011: Multiple problems in SIP channel parser handling response codes
> Asterisk Project Security Advisory - ASA-2007-011 > > +------------------------------------------------------------------------+ > | Product | Asterisk | > |--------------------+---------------------------------------------------| > | Summary | Multiple problems in SIP channel parser
2007 Apr 24
0
ASA-2007-011: Multiple problems in SIP channel parser handling response codes
> Asterisk Project Security Advisory - ASA-2007-011 > > +------------------------------------------------------------------------+ > | Product | Asterisk | > |--------------------+---------------------------------------------------| > | Summary | Multiple problems in SIP channel parser