Displaying 20 results from an estimated 10000 matches similar to: "AST-2018-006: WebSocket frames with 0 sized payload causes DoS"
2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006
Product Asterisk
Summary SIP request can change address of a SIP peer.
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Minor
2014 Dec 10
0
AST-2014-019: Remote Crash Vulnerability in WebSocket Server
Asterisk Project Security Advisory - AST-2014-019
Product Asterisk
Summary Remote Crash Vulnerability in WebSocket Server
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2014 Dec 10
0
AST-2014-019: Remote Crash Vulnerability in WebSocket Server
Asterisk Project Security Advisory - AST-2014-019
Product Asterisk
Summary Remote Crash Vulnerability in WebSocket Server
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2019 Nov 21
0
AST-2019-008: Re-invite with T.38 and malformed SDP causes crash.
Asterisk Project Security Advisory -
Product Asterisk
Summary Re-invite with T.38 and malformed SDP causes crash.
Nature of Advisory Remote Crash
Susceptibility Remote Authenticated Sessions
Severity Minor
2018 Sep 20
0
AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade
Asterisk Project Security Advisory - AST-2018-009
Product Asterisk
Summary Remote crash vulnerability in HTTP websocket upgrade
Nature of Advisory Denial Of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2018 Feb 21
0
AST-2018-001: Crash when receiving unnegotiated dynamic payload
Asterisk Project Security Advisory - AST-2018-001
Product Asterisk
Summary Crash when receiving unnegotiated dynamic payload
Nature of Advisory Remote Crash
Susceptibility Remote Unauthenticated Sessions
Severity Major
2020 Nov 05
0
AST-2020-002: Outbound INVITE loop on challenge with different nonce.
Asterisk Project Security Advisory – AST-2020-002
Product Asterisk
Summary Outbound INVITE loop on challenge with different
nonce.
Nature of Advisory Denial of Service
Susceptibility Remote
2018 Feb 21
0
Asterisk 13.19.2, 14.7.6, 15.2.2 and 13.18-cert3 Now Available (Security)
The Asterisk Development Team would like to announce security releases for
Asterisk 13, 14 and 15, and Certified Asterisk 13.18. The available releases are
released as versions 13.19.2, 14.7.6, 15.2.2 and 13.18-cert3.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
2013 May 14
1
Problem with R websocket package
Hello to everybody,
I seem to be in struggle with the websockets in R. I wanted to download the
streaming data from the BitCoin exchange MtGox directly to R, but R cannot
establish the connection.
The websocket specs are defined as:
* Host: websocket.mtgox.com or socketio.mtgox.com
* Port: 80 or 443 ( ssl )
* Namespace: /mtgox (Including beginning slash)
url for more
2013 Sep 12
1
How to get call progress events from WebSocket connected to Asterisk 12 ARI events API
Hello,
I am experimenting with Asterisk 12.0.0 alpha1. I have a couple of SIP
phones working. Good. I can retrieve data using curl to interact with the
new Asterisk REST API (ARI). Good.
Now I want to use the new ARI events API, which requires a WebSocket
connection. I am using Node.js for the client, and have a stable
connection to ARI events on the Asterisk 12 server.
What I hope for is
2020 May 11
1
Asterisk versions?
Thanks for that info, Ben. I do like to test out the latest and most
up-to-date versions of things when I can, so I'll check those files
and see how it goes.
On 2020-05-11 17:20,
Ben Ford <bford at digium.com> put forth the proposition:
> Hey Dave,
>
> In the case of 13 and 16, these are LTS versions which means that they get
> long term service. 17 is a standard release.
2019 Jan 04
2
CyberMegaPhone WebRTC Video Conference demo
I am trying to run the CyberMegaPhone demo to see the WebRTC Video Conference demonstration from AstriDevCon 2017
I have been able to make WebRTC work on this same box with SIPML5 demo but not the CMP2K.
When I attempt to access the https://myip:8089/cmp2k I am prompted for the unsecure web. I enable unsecure web. (Using the asterisk local certificate generation from the SIPML5 demo).
After
2012 Jun 20
1
Websocket example out of the box failing if running at startup from Rprofile.site
Hello,
I run websockets 1.1.1 from R 2.15 without any problems. I would like
to deploy R script running automatically for all users when R is
starting from Rprofile.site like follow:
.First <- function()
{
source("C:\\R\\orig-websockets.R")
}
This script is from websockets package distribution.
The error is follow:
Error in .parse_header(x) :
2017 Aug 31
0
AST-2017-006: Shell access command injection in app_minivm
Asterisk Project Security Advisory - AST-2017-006
Product Asterisk
Summary Shell access command injection in app_minivm
Nature of Advisory Unauthorized command execution
Susceptibility Remote Authenticated Sessions
Severity Moderate
2011 Apr 21
0
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006
Product Asterisk
Summary Asterisk Manager User Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2020 May 29
0
Re: Provide NBD via Browser over Websockets
On Fri, May 29, 2020 at 08:58:06AM -0500, Eric Blake wrote:
> On 5/29/20 8:50 AM, Daniel P. Berrangé wrote:
>
> >>>(2) You need to persuade qemu's NBD client to read from a WebSocket.
> >>>I didn't really know anything about WebSockets until today but it
> >>>seems as if they are a full-duplex protocol layered on top of HTTP [a].
>