similar to: AST-2018-006: WebSocket frames with 0 sized payload causes DoS

Displaying 20 results from an estimated 10000 matches similar to: "AST-2018-006: WebSocket frames with 0 sized payload causes DoS"

2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006 Product Asterisk Summary SIP request can change address of a SIP peer. Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Minor
2014 Dec 10
0
AST-2014-019: Remote Crash Vulnerability in WebSocket Server
Asterisk Project Security Advisory - AST-2014-019 Product Asterisk Summary Remote Crash Vulnerability in WebSocket Server Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Moderate
2014 Dec 10
0
AST-2014-019: Remote Crash Vulnerability in WebSocket Server
Asterisk Project Security Advisory - AST-2014-019 Product Asterisk Summary Remote Crash Vulnerability in WebSocket Server Nature of Advisory Denial of Service Susceptibility Remote Unauthenticated Sessions Severity Moderate
2019 Nov 21
0
AST-2019-008: Re-invite with T.38 and malformed SDP causes crash.
Asterisk Project Security Advisory - Product Asterisk Summary Re-invite with T.38 and malformed SDP causes crash. Nature of Advisory Remote Crash Susceptibility Remote Authenticated Sessions Severity Minor
2018 Sep 20
0
AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade
Asterisk Project Security Advisory - AST-2018-009 Product Asterisk Summary Remote crash vulnerability in HTTP websocket upgrade Nature of Advisory Denial Of Service Susceptibility Remote Unauthenticated Sessions Severity Moderate
2018 Feb 21
0
AST-2018-001: Crash when receiving unnegotiated dynamic payload
Asterisk Project Security Advisory - AST-2018-001 Product Asterisk Summary Crash when receiving unnegotiated dynamic payload Nature of Advisory Remote Crash Susceptibility Remote Unauthenticated Sessions Severity Major
2020 Nov 05
0
AST-2020-002: Outbound INVITE loop on challenge with different nonce.
Asterisk Project Security Advisory – AST-2020-002 Product Asterisk Summary Outbound INVITE loop on challenge with different nonce. Nature of Advisory Denial of Service Susceptibility Remote
2018 Feb 21
0
Asterisk 13.19.2, 14.7.6, 15.2.2 and 13.18-cert3 Now Available (Security)
The Asterisk Development Team would like to announce security releases for Asterisk 13, 14 and 15, and Certified Asterisk 13.18. The available releases are released as versions 13.19.2, 14.7.6, 15.2.2 and 13.18-cert3. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases
2013 May 14
1
Problem with R websocket package
Hello to everybody,   I seem to be in struggle with the websockets in R. I wanted to download the streaming data from the BitCoin exchange MtGox directly to R, but R cannot establish the connection. The websocket specs are defined as: * Host: websocket.mtgox.com or socketio.mtgox.com * Port: 80 or 443 ( ssl ) * Namespace: /mtgox (Including beginning slash) url for more
2013 Sep 12
1
How to get call progress events from WebSocket connected to Asterisk 12 ARI events API
Hello, I am experimenting with Asterisk 12.0.0 alpha1. I have a couple of SIP phones working. Good. I can retrieve data using curl to interact with the new Asterisk REST API (ARI). Good. Now I want to use the new ARI events API, which requires a WebSocket connection. I am using Node.js for the client, and have a stable connection to ARI events on the Asterisk 12 server. What I hope for is
2020 May 11
1
Asterisk versions?
Thanks for that info, Ben. I do like to test out the latest and most up-to-date versions of things when I can, so I'll check those files and see how it goes. On 2020-05-11 17:20, Ben Ford <bford at digium.com> put forth the proposition: > Hey Dave, > > In the case of 13 and 16, these are LTS versions which means that they get > long term service. 17 is a standard release.
2019 Jan 04
2
CyberMegaPhone WebRTC Video Conference demo
I am trying to run the CyberMegaPhone demo to see the WebRTC Video Conference demonstration from AstriDevCon 2017 I have been able to make WebRTC work on this same box with SIPML5 demo but not the CMP2K. When I attempt to access the https://myip:8089/cmp2k I am prompted for the unsecure web. I enable unsecure web. (Using the asterisk local certificate generation from the SIPML5 demo). After
2012 Jun 20
1
Websocket example out of the box failing if running at startup from Rprofile.site
Hello, I run websockets 1.1.1 from R 2.15 without any problems. I would like to deploy R script running automatically for all users when R is starting from Rprofile.site like follow: .First <- function() { source("C:\\R\\orig-websockets.R") } This script is from websockets package distribution. The error is follow: Error in .parse_header(x) :
2017 Aug 31
0
AST-2017-006: Shell access command injection in app_minivm
Asterisk Project Security Advisory - AST-2017-006 Product Asterisk Summary Shell access command injection in app_minivm Nature of Advisory Unauthorized command execution Susceptibility Remote Authenticated Sessions Severity Moderate
2011 Apr 21
0
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006 Product Asterisk Summary Asterisk Manager User Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions Severity Minor
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006 Product Asterisk Summary Asterisk Manager User Unauthorized Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions Severity Minor
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006 Product Asterisk Summary Asterisk Manager User Unauthorized Shell Access Nature of Advisory Permission Escalation Susceptibility Remote Authenticated Sessions Severity Minor
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006 Product Asterisk Summary Buffer Overflow when receiving odd length 16 bit SMS message Nature of Advisory Buffer Overflow and Remote Crash Susceptibility Remote
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006 Product Asterisk Summary Buffer Overflow when receiving odd length 16 bit SMS message Nature of Advisory Buffer Overflow and Remote Crash Susceptibility Remote
2020 May 29
0
Re: Provide NBD via Browser over Websockets
On Fri, May 29, 2020 at 08:58:06AM -0500, Eric Blake wrote: > On 5/29/20 8:50 AM, Daniel P. Berrangé wrote: > > >>>(2) You need to persuade qemu's NBD client to read from a WebSocket. > >>>I didn't really know anything about WebSockets until today but it > >>>seems as if they are a full-duplex protocol layered on top of HTTP [a]. >