similar to: AST-2018-003: Crash with an invalid SDP fmtp attribute

Displaying 20 results from an estimated 3000 matches similar to: "AST-2018-003: Crash with an invalid SDP fmtp attribute"

2018 Feb 21
0
AST-2018-002: Crash when given an invalid SDP media format description
Asterisk Project Security Advisory - AST-2018-002 Product Asterisk Summary Crash when given an invalid SDP media format description Nature of Advisory Remote crash Susceptibility Remote
2018 Feb 21
0
Asterisk 13.19.2, 14.7.6, 15.2.2 and 13.18-cert3 Now Available (Security)
The Asterisk Development Team would like to announce security releases for Asterisk 13, 14 and 15, and Certified Asterisk 13.18. The available releases are released as versions 13.19.2, 14.7.6, 15.2.2 and 13.18-cert3. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases
2018 Feb 21
0
AST-2018-004: Crash when receiving SUBSCRIBE request
Asterisk Project Security Advisory - AST-2018-004 Product Asterisk Summary Crash when receiving SUBSCRIBE request Nature of Advisory Remote Crash Susceptibility Remote Unauthenticated Sessions Severity Major
2018 Feb 21
0
AST-2018-005: Crash when large numbers of TCP connections are closed suddenly
Asterisk Project Security Advisory - AST-2018-005 Product Asterisk Summary Crash when large numbers of TCP connections are closed suddenly Nature of Advisory Remote Crash Susceptibility Remote
2017 Dec 22
0
AST-2017-014: Crash in PJSIP resource when missing a contact header
Asterisk Project Security Advisory - AST-2017-014 Product Asterisk Summary Crash in PJSIP resource when missing a contact header Nature of Advisory Remote Crash Susceptibility Remote
2020 Nov 05
0
AST-2020-001: Remote crash in res_pjsip_session
Asterisk Project Security Advisory - AST-2020-001 Product Asterisk Summary Remote crash in res_pjsip_session Nature of Advisory Denial of service Susceptibility Remote authenticated sessions Severity
2014 Jun 12
0
AST-2014-005: Remote Crash in PJSIP Channel Driver's Publish/Subscribe Framework
Asterisk Project Security Advisory - AST-2014-005 Product Asterisk Summary Remote Crash in PJSIP Channel Driver's Publish/Subscribe Framework Nature of Advisory Denial of Service Susceptibility
2014 Nov 21
0
AST-2014-018: AMI permission escalation through DB dialplan function
Asterisk Project Security Advisory - AST-2014-018 Product Asterisk Summary AMI permission escalation through DB dialplan function Nature of Advisory Permission Escalation Susceptibility Remote
2018 Jun 11
0
AST-2018-007: Infinite loop when reading iostreams
Asterisk Project Security Advisory - AST-2018-007 Product Asterisk Summary Infinite loop when reading iostreams Nature of Advisory Denial of Service Susceptibility Remote Authenticated Sessions Severity Critical
2014 Jun 12
0
AST-2014-005: Remote Crash in PJSIP Channel Driver's Publish/Subscribe Framework
Asterisk Project Security Advisory - AST-2014-005 Product Asterisk Summary Remote Crash in PJSIP Channel Driver's Publish/Subscribe Framework Nature of Advisory Denial of Service Susceptibility
2014 Nov 21
0
AST-2014-018: AMI permission escalation through DB dialplan function
Asterisk Project Security Advisory - AST-2014-018 Product Asterisk Summary AMI permission escalation through DB dialplan function Nature of Advisory Permission Escalation Susceptibility Remote
2014 Nov 21
0
AST-2014-017: <font size="3" style="font-size: 12pt">Permission escalation through ConfBridge actions/dialplan functions</font>
Asterisk Project Security Advisory - AST-2014-017 Product Asterisk Summary Permission escalation through ConfBridge actions/dialplan functions Nature of Advisory Permission Escalation Susceptibility Remote
2014 Nov 21
0
AST-2014-017: <font size="3" style="font-size: 12pt">Permission escalation through ConfBridge actions/dialplan functions</font>
Asterisk Project Security Advisory - AST-2014-017 Product Asterisk Summary Permission escalation through ConfBridge actions/dialplan functions Nature of Advisory Permission Escalation Susceptibility Remote
2017 Apr 04
0
AST-2017-001: Buffer overflow in CDR's set user
Asterisk Project Security Advisory - AST-2017-001 Product Asterisk Summary Buffer overflow in CDR's set user Nature of Advisory Buffer Overflow Susceptibility Remote Authenticated Sessions Severity
2017 Nov 08
0
AST-2017-011: Memory leak in pjsip session resource
Asterisk Project Security Advisory - AST-2017-011 Product Asterisk Summary Memory leak in pjsip session resource Nature of Advisory Memory leak Susceptibility Remote Sessions Severity Minor
2019 Sep 05
0
AST-2019-004: Crash when negotiating for T.38 with a declined stream
Asterisk Project Security Advisory - AST-2019-004 Product Asterisk Summary Crash when negotiating for T.38 with a declined stream Nature of Advisory Remote Crash Susceptibility Remote
2017 Dec 21
0
Certified Asterisk 13.18-cert1 Now Available
The Asterisk Development Team would like to announce the release of Certified Asterisk 13.18-cert1. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/certified-asterisk The release of Certified Asterisk 13.18-cert1 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following
2016 Dec 08
0
AST-2016-008: Crash on SDP offer or answer from endpoint using Opus
Asterisk Project Security Advisory - AST-2016-008 Product Asterisk Summary Crash on SDP offer or answer from endpoint using Opus Nature of Advisory Remote Crash Susceptibility Remote
2018 Jun 05
0
Certified Asterisk 13.21-cert1 Now Available
The Asterisk Development Team would like to announce the release of Certified Asterisk 13.21-cert1. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/certified-asterisk The release of Certified Asterisk 13.21-cert1 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following
2020 Feb 25
2
pjsip startup errors when using "with-ssl" configure option
Hi Kevin! Thanks very much for your reply! Much appreciated! So I just have a remaining question from this, if the with-ssl is not mandatory to have the encryption support, what is it actually used for? Maybe it is some old flag which is not needed anymore and so can be ignored for now and possibly removed from the configure/makefile stuff for future releases? Kind regards, Patrick Wakano On