Displaying 20 results from an estimated 4000 matches similar to: "AST-2011-006: Asterisk Manager User Shell Access"
2011 Apr 21
0
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006
Product Asterisk
Summary Asterisk Manager User Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2011 Apr 21
0
AST-2011-005: File Descriptor Resource Exhaustion
Asterisk Project Security Advisory - AST-2011-005
Product Asterisk
Summary File Descriptor Resource Exhaustion
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated TCP Based Sessions (TCP SIP,
Skinny,
2011 Apr 21
0
AST-2011-005: File Descriptor Resource Exhaustion
Asterisk Project Security Advisory - AST-2011-005
Product Asterisk
Summary File Descriptor Resource Exhaustion
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated TCP Based Sessions (TCP SIP,
Skinny,
2010 Oct 14
6
Audiocodes firmware
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
</head>
<body text="#000000" bgcolor="#ffffff">
<font size="+1">Does anyone have links to the most recent audiocodes
2023 Aug 18
1
PJSIP Losing knowledge of external_media_address
On Fri, Aug 18, 2023 at 1:09 PM Mark Murawski <markm-lists at intellasoft.net>
wrote:
> I've seen this happen three times in the wild now. I've been trying to
> isolate the source of the issue, but so far it seems like there's not
> enough debug output to know why this occurs.
>
> Long story short:
> - Start Asterisk
> - PJSIP Handles receiving INVITE from
2011 Jan 18
3
AST-2011-001: Stack buffer overflow in SIP channel driver
Asterisk Project Security Advisory - AST-2011-001
Product Asterisk
Summary Stack buffer overflow in SIP channel driver
Nature of Advisory Exploitable Stack Buffer Overflow
Susceptibility Remote Authenticated Sessions
Severity Moderate
2011 Apr 21
0
Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 Now Available (Security Releases)
The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and
2011 Apr 21
0
Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 Now Available (Security Releases)
The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and
2023 Aug 18
2
PJSIP Losing knowledge of external_media_address
I've seen this happen three times in the wild now. I've been trying to
isolate the source of the issue, but so far it seems like there's not
enough debug output to know why this occurs.
Long story short:
- Start Asterisk
- PJSIP Handles receiving INVITE from ITSP via WAN (Asterisk is behind
NAT). SIP is handled correctly, Asterisk responds OK with RTP media
address of
2011 Mar 25
1
Removing Polycom Transfer Softkey
Sorry for the crosspost. This was supposed to be on -users
I know some of you are polycom gurus...
Anyone know how to remove transfer from a polycom 33x phone? We've set
allowtransfer=no, but we would like to remove a polycom soft key as well.
2017 Aug 31
0
AST-2017-006: Shell access command injection in app_minivm
Asterisk Project Security Advisory - AST-2017-006
Product Asterisk
Summary Shell access command injection in app_minivm
Nature of Advisory Unauthorized command execution
Susceptibility Remote Authenticated Sessions
Severity Moderate
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2011 Aug 18
2
Asterisk 1.8 SIP_CAUSE performance regression
Greetings,
Recently a performance regression in chan_sip was discovered in Asterisk
1.8. The regression is caused by chan_sip setting
MASTER_CHANNEL(HASH(SIP_CAUSE,<chan name>)) after each response received
on a channel. That feature has been made optional in the latest 1.8 SVN
code, but is currently still enabled by default. After some internal
discussion, we decided to consider disabling
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2018 Feb 21
0
AST-2018-006: WebSocket frames with 0 sized payload causes DoS
Asterisk Project Security Advisory - AST-2018-006
Product Asterisk
Summary WebSocket frames with 0 sized payload causes DoS
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006
Product Asterisk
Summary SIP request can change address of a SIP peer.
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Minor
2012 Apr 23
0
AST-2012-006: Remote Crash Vulnerability in SIP Channel Driver
Asterisk Project Security Advisory - AST-2012-006
Product Asterisk
Summary Remote Crash Vulnerability in SIP Channel Driver
Nature of Advisory Remote Crash
Susceptibility Remote Authenticated Sessions
Severity
2016 Sep 08
0
AST-2016-006: Crash on ACK from unknown endpoint
Asterisk Project Security Advisory - AST-2016-006
Product Asterisk
Summary Crash on ACK from unknown endpoint
Nature of Advisory Remote Crash
Susceptibility Remote unauthenticated sessions
Severity Critical