Displaying 20 results from an estimated 2000 matches similar to: "AST-2012-015: Denial of Service Through Exploitation of Device State Caching"
2013 Mar 27
0
AST-2013-002: Denial of Service in HTTP server
Asterisk Project Security Advisory - AST-2013-002
Product Asterisk
Summary Denial of Service in HTTP server
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Major
2013 Mar 27
0
AST-2013-002: Denial of Service in HTTP server
Asterisk Project Security Advisory - AST-2013-002
Product Asterisk
Summary Denial of Service in HTTP server
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Major
2014 Oct 20
0
AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
Asterisk Project Security Advisory - AST-2014-011
Product Asterisk
Summary Asterisk Susceptibility to POODLE Vulnerability
Nature of Advisory Unauthorized Data Disclosure
Susceptibility Remote Unauthenticated Sessions
Severity Medium
2014 Oct 20
0
AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
Asterisk Project Security Advisory - AST-2014-011
Product Asterisk
Summary Asterisk Susceptibility to POODLE Vulnerability
Nature of Advisory Unauthorized Data Disclosure
Susceptibility Remote Unauthenticated Sessions
Severity Medium
2012 Aug 30
0
AST-2012-013: ACL rules ignored when placing outbound calls by certain IAX2 users
Asterisk Project Security Advisory - AST-2012-013
Product Asterisk
Summary ACL rules ignored when placing outbound calls by
certain IAX2 users
Nature of Advisory Unauthorized use of system
Susceptibility Remote
2010 Oct 25
4
google voice + asterisk: calls made to GV# processed but weird
Dear all,
First off, I am very new to asterisk so forgive me if any of my
comments or questions seem trivial. Thanks to [this
post](http://blog.polybeacon.com/2010/10/17/asterisk-1-8-and-google-voice/)
and [this post](http://www.davidvossel.com/?p=28), I have GV set up on
asterisk through jabber.conf and gtalk.conf. I can successfully dial
out from asterisk.
I'm trying to set up an
2012 Aug 30
0
Asterisk 1.8.11-cert7, 1.8.15.1, 10.7.1, 10.7.1-digiumphones Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.11 and Asterisk 1.8 and 10. The available security releases are
released as versions 1.8.11-cert7, 1.8.15.1, 10.7.1, and 10.7.1-digiumphones.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.8.11-cert7, 1.8.15.1,
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2013 Aug 28
0
AST-2013-005: Remote Crash when Invalid SDP is sent in SIP Request
Asterisk Project Security Advisory - AST-2013-005
Product Asterisk
Summary Remote Crash when Invalid SDP is sent in SIP Request
Nature of Advisory Remote Crash
Susceptibility Remote Unauthenticated Sessions
Severity Major
2013 Aug 28
0
AST-2013-005: Remote Crash when Invalid SDP is sent in SIP Request
Asterisk Project Security Advisory - AST-2013-005
Product Asterisk
Summary Remote Crash when Invalid SDP is sent in SIP Request
Nature of Advisory Remote Crash
Susceptibility Remote Unauthenticated Sessions
Severity Major
2013 Dec 16
0
AST-2013-007: Asterisk Manager User Dialplan Permission Escalation
Asterisk Project Security Advisory - AST-2013-007
Product Asterisk
Summary Asterisk Manager User Dialplan Permission Escalation
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2013 Dec 16
0
AST-2013-007: Asterisk Manager User Dialplan Permission Escalation
Asterisk Project Security Advisory - AST-2013-007
Product Asterisk
Summary Asterisk Manager User Dialplan Permission Escalation
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2014 Oct 20
0
Asterisk 1.8.28-cert2, 1.8.31.1, 11.6-cert7, 11.13.1, 12.6.1, 13.0.0-beta3 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available
security releases are released as versions 1.8.28-cert2, 11.6-cert7, 1.8.31.1,
11.13.1, 12.6.1, and 13.0.0-beta3.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of
2014 Oct 20
0
Asterisk 1.8.28-cert2, 1.8.31.1, 11.6-cert7, 11.13.1, 12.6.1, 13.0.0-beta3 Now Available (Security Release)
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available
security releases are released as versions 1.8.28-cert2, 11.6-cert7, 1.8.31.1,
11.13.1, 12.6.1, and 13.0.0-beta3.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of
2013 Jan 10
1
Segmentation fault after upgrading from asterisk-10.5.0 to asterisk-11.1.2
After upgrading from asterisk-10.5.0 to asterisk-11.1.2, I am getting a Segmentation fault.
[root at localhost asterisk-11.1.2]# asterisk -vvvvvvc
Asterisk 11.1.2, Copyright (C) 1999 - 2012 Digium, Inc. and others.
Created by Mark Spencer <markster at digium.com>
Asterisk comes with ABSOLUTELY NO WARRANTY; type 'core show warranty' for details.
This is free software, with components
2014 Nov 21
0
AST-2014-015: Remote Crash Vulnerability in PJSIP channel driver
Asterisk Project Security Advisory - AST-2014-015
Product Asterisk
Summary Remote Crash Vulnerability in PJSIP channel driver
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2014 Nov 21
0
AST-2014-015: Remote Crash Vulnerability in PJSIP channel driver
Asterisk Project Security Advisory - AST-2014-015
Product Asterisk
Summary Remote Crash Vulnerability in PJSIP channel driver
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2012 Sep 20
1
chan_motif, xmpp, jabber, jingle
Hi all,
For one of my inverstigations it looks like i'm back to "square one"
I'm trying to accept an incoming xmpp call and forward it conditionally
to a sip, isdn, or voicemail.
No google is involved as i use a local xmpp server (ejabberd)
I was experimenting on 1.8.15.1 (with jabber.conf, jingle.conf), but
some suggested me to have a look at asterisk11,so i did...
I
2015 Mar 18
1
res_xmpp.c:3468 xmpp_client_reconnect:
2015-03-18 11:13 GMT-06:00 ricky gutierrez <xserverlinux at gmail.com>:
> Hi , I'm trying to apply this patch from the source asterisk
> asterisk-11.16.0 and when I apply it shows me this message
>
> asterisk-11.16.0]#patch -p0 < refs
> patch: **** Only garbage was found in the patch input.
>
> is the correct way to apply the patch or am I doing wrong?
>