Displaying 20 results from an estimated 5000 matches similar to: "AST-2019-003: Remote Crash Vulnerability in chan_sip channel driver"
2019 Jul 11
0
Asterisk 13.27.1, 15.7.3, 16.4.1 and 13.21-cert4 Now Available (Security)
The Asterisk Development Team would like to announce security releases for
Asterisk 13, 15 and 16, and Certified Asterisk 13.21. The available releases are
released as versions 13.27.1, 15.7.3, 16.4.1 and 13.21-cert4.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
2019 Jul 11
0
AST-2019-002: Remote crash vulnerability with MESSAGE messages
Asterisk Project Security Advisory - AST-2019-002
Product Asterisk
Summary Remote crash vulnerability with MESSAGE messages
Nature of Advisory Denial Of Service
Susceptibility Remote Authenticated Sessions
Severity Low
2017 May 19
0
AST-2017-003: Crash in PJSIP multi-part body parser
Asterisk Project Security Advisory - AST-2017-003
Product Asterisk
Summary Crash in PJSIP multi-part body parser
Nature of Advisory Remote Crash
Susceptibility Remote Unauthenticated Sessions
Severity Critical
2016 Feb 04
0
AST-2016-003: Remote crash vulnerability when receiving UDPTL FAX data.
Asterisk Project Security Advisory - AST-2016-003
Product Asterisk
Summary Remote crash vulnerability when receiving UDPTL FAX
data.
Nature of Advisory Denial of Service
Susceptibility Remote
2014 Mar 10
0
AST-2014-003: Remote Crash Vulnerability in PJSIP channel driver
Asterisk Project Security Advisory - AST-2014-003
Product Asterisk
Summary Remote Crash Vulnerability in PJSIP channel driver
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2014 Mar 10
0
AST-2014-003: Remote Crash Vulnerability in PJSIP channel driver
Asterisk Project Security Advisory - AST-2014-003
Product Asterisk
Summary Remote Crash Vulnerability in PJSIP channel driver
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2018 Jun 11
0
AST-2018-008: PJSIP endpoint presence disclosure when using ACL
Asterisk Project Security Advisory - AST-2018-008
Product Asterisk
Summary PJSIP endpoint presence disclosure when using ACL
Nature of Advisory Unauthorized data disclosure
Susceptibility Remote Unauthenticated Sessions
Severity Minor
2019 Nov 21
0
AST-2019-008: Re-invite with T.38 and malformed SDP causes crash.
Asterisk Project Security Advisory -
Product Asterisk
Summary Re-invite with T.38 and malformed SDP causes crash.
Nature of Advisory Remote Crash
Susceptibility Remote Authenticated Sessions
Severity Minor
2015 Jan 28
0
AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
Asterisk Project Security Advisory - AST-2015-002
Product Asterisk
Summary Mitigation for libcURL HTTP request injection
vulnerability
Nature of Advisory HTTP request injection
Susceptibility Remote
2015 Jan 28
0
AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
Asterisk Project Security Advisory - AST-2015-002
Product Asterisk
Summary Mitigation for libcURL HTTP request injection
vulnerability
Nature of Advisory HTTP request injection
Susceptibility Remote
2018 Sep 20
0
AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade
Asterisk Project Security Advisory - AST-2018-009
Product Asterisk
Summary Remote crash vulnerability in HTTP websocket upgrade
Nature of Advisory Denial Of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2018 Jun 11
0
Asterisk 15.4.1, 13.21.1, 14.7.7, 13.18-cert4 and 13.21-cert2 Now Available (Security)
The Asterisk Development Team would like to announce security releases for
Asterisk 15, 13 and 14, and Certified Asterisk 13.18 and 13.21. The available
releases are released as versions 15.4.1, 13.21.1, 14.7.7, 13.18-cert4 and
13.21-cert2.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
2019 Nov 21
0
AST-2019-007: AMI user could execute system commands.
Asterisk Project Security Advisory - AST-2019-007
Product Asterisk
Summary AMI user could execute system commands.
Nature of Advisory Remote Code Execution
Susceptibility Remote Authenticated Sessions
Severity Minor
2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006
Product Asterisk
Summary SIP request can change address of a SIP peer.
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Minor
2018 Feb 21
0
AST-2018-003: Crash with an invalid SDP fmtp attribute
Asterisk Project Security Advisory - AST-2018-003
Product Asterisk
Summary Crash with an invalid SDP fmtp attribute
Nature of Advisory Remote crash
Susceptibility Remote Authenticated Sessions
Severity Minor
2015 Apr 08
0
AST-2015-003: TLS Certificate Common name NULL byte exploit
Asterisk Project Security Advisory - AST-2015-003
Product Asterisk
Summary TLS Certificate Common name NULL byte exploit
Nature of Advisory Man in the Middle Attack
Susceptibility Remote Authenticated Sessions
Severity Major
2015 Apr 08
0
AST-2015-003: TLS Certificate Common name NULL byte exploit
Asterisk Project Security Advisory - AST-2015-003
Product Asterisk
Summary TLS Certificate Common name NULL byte exploit
Nature of Advisory Man in the Middle Attack
Susceptibility Remote Authenticated Sessions
Severity Major
2010 Feb 25
0
AST-2010-003: Invalid parsing of ACL rules can compromise security
Asterisk Project Security Advisory - AST-2010-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Invalid parsing of ACL rules can compromise |
| | security
2010 Feb 25
0
AST-2010-003: Invalid parsing of ACL rules can compromise security
Asterisk Project Security Advisory - AST-2010-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Invalid parsing of ACL rules can compromise |
| | security
2015 Feb 27
0
Reply to INVITE with 1 codec
In Version 1.8 asterisk introduced this parameter preferred_codec_only, when set to "yes" the 200 OK to the INVITE contains 1 codec only from the available ones in the user sip profile.
But in version 13.1 (I think version 11.2 also) is not working like that , it keeps sending all the codecs and sometimes both parties pick a different one causing one way audio.
Example: INVITE has ulaw,