similar to: AST-2011-006: Asterisk Manager User Shell Access

Displaying 20 results from an estimated 4000 matches similar to: "AST-2011-006: Asterisk Manager User Shell Access"

2011 Apr 21
0
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006 Product Asterisk Summary Asterisk Manager User Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions Severity Minor
2011 Apr 21
0
AST-2011-005: File Descriptor Resource Exhaustion
Asterisk Project Security Advisory - AST-2011-005 Product Asterisk Summary File Descriptor Resource Exhaustion Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated TCP Based Sessions (TCP SIP, Skinny,
2011 Apr 21
0
AST-2011-005: File Descriptor Resource Exhaustion
Asterisk Project Security Advisory - AST-2011-005 Product Asterisk Summary File Descriptor Resource Exhaustion Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated TCP Based Sessions (TCP SIP, Skinny,
2010 Oct 14
6
Audiocodes firmware
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1"> </head> <body text="#000000" bgcolor="#ffffff"> <font size="+1">Does anyone have links to the most recent audiocodes
2023 Aug 18
1
PJSIP Losing knowledge of external_media_address
On Fri, Aug 18, 2023 at 1:09 PM Mark Murawski <markm-lists at intellasoft.net> wrote: > I've seen this happen three times in the wild now. I've been trying to > isolate the source of the issue, but so far it seems like there's not > enough debug output to know why this occurs. > > Long story short: > - Start Asterisk > - PJSIP Handles receiving INVITE from
2011 Jan 18
3
AST-2011-001: Stack buffer overflow in SIP channel driver
Asterisk Project Security Advisory - AST-2011-001 Product Asterisk Summary Stack buffer overflow in SIP channel driver Nature of Advisory Exploitable Stack Buffer Overflow Susceptibility Remote Authenticated Sessions Severity Moderate
2011 Apr 21
0
Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 Now Available (Security Releases)
The Asterisk Development Team has announced security releases for Asterisk branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and
2011 Apr 21
0
Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 Now Available (Security Releases)
The Asterisk Development Team has announced security releases for Asterisk branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and
2023 Aug 18
2
PJSIP Losing knowledge of external_media_address
I've seen this happen three times in the wild now.  I've been trying to isolate the source of the issue, but so far it seems like there's not enough debug output to know why this occurs. Long story short: - Start Asterisk - PJSIP Handles receiving INVITE from ITSP via WAN (Asterisk is behind NAT).  SIP is handled correctly, Asterisk responds OK with RTP media address of
2011 Mar 25
1
Removing Polycom Transfer Softkey
Sorry for the crosspost. This was supposed to be on -users I know some of you are polycom gurus... Anyone know how to remove transfer from a polycom 33x phone? We've set allowtransfer=no, but we would like to remove a polycom soft key as well.
2017 Aug 31
0
AST-2017-006: Shell access command injection in app_minivm
Asterisk Project Security Advisory - AST-2017-006 Product Asterisk Summary Shell access command injection in app_minivm Nature of Advisory Unauthorized command execution Susceptibility Remote Authenticated Sessions Severity Moderate
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006 Product Asterisk Summary Asterisk Manager User Unauthorized Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions Severity Minor
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006 Product Asterisk Summary Asterisk Manager User Unauthorized Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions Severity Minor
2011 Aug 18
2
Asterisk 1.8 SIP_CAUSE performance regression
Greetings, Recently a performance regression in chan_sip was discovered in Asterisk 1.8. The regression is caused by chan_sip setting MASTER_CHANNEL(HASH(SIP_CAUSE,<chan name>)) after each response received on a channel. That feature has been made optional in the latest 1.8 SVN code, but is currently still enabled by default. After some internal discussion, we decided to consider disabling
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006 Product Asterisk Summary Buffer Overflow when receiving odd length 16 bit SMS message Nature of Advisory Buffer Overflow and Remote Crash Susceptibility Remote
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006 Product Asterisk Summary Buffer Overflow when receiving odd length 16 bit SMS message Nature of Advisory Buffer Overflow and Remote Crash Susceptibility Remote
2018 Feb 21
0
AST-2018-006: WebSocket frames with 0 sized payload causes DoS
Asterisk Project Security Advisory - AST-2018-006 Product Asterisk Summary WebSocket frames with 0 sized payload causes DoS Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Moderate
2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006 Product Asterisk Summary SIP request can change address of a SIP peer. Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Minor
2012 Apr 23
0
AST-2012-006: Remote Crash Vulnerability in SIP Channel Driver
Asterisk Project Security Advisory - AST-2012-006 Product Asterisk Summary Remote Crash Vulnerability in SIP Channel Driver Nature of Advisory Remote Crash Susceptibility Remote Authenticated Sessions Severity
2016 Sep 08
0
AST-2016-006: Crash on ACK from unknown endpoint
Asterisk Project Security Advisory - AST-2016-006 Product Asterisk Summary Crash on ACK from unknown endpoint Nature of Advisory Remote Crash Susceptibility Remote unauthenticated sessions Severity Critical