Skip to content
Narrow screen resolution Wide screen resolution Auto adjust screen size Increase font size Decrease font size Default font size default color grey color red color blue color

Totek - Asterisk VoIP (SIP) News & Technology Source

Asterisk 1.2.22/1.4.8 and Zaptel 1.2.19 /1.4.4 released PDF Print E-mail
User Rating: / 0
Written by Web Master   
Sunday, 22 July 2007

From the Release Notes:

These releases contain fixes for four critical security vulnerabilities. One of these vulnerabilities is a remotely exploitable stack buffer overflow, which could allow an attacker to execute arbitrary code on the target machine. The other three are all remotely exploitable crash vulnerabilities.

We have released Asterisk Security Advisories for each of the vulnerabilities. The current version of each advisory can be downloaded from the ftp site.

* Affected systems include those that bridge calls between chan_iax2 and any channel driver that uses RTP for media

* Affected systems include any system that has chan_iax2 enabled

* Affected systems include any system that has chan_skinny enabled

* Affected systems include any 1.4 system that has any channel driver that uses RTP for media enabled

All users that have systems that meet any of the criteria listed above should upgrade as soon as possible.

Zaptel 1.2.19 and 1.4.4 Notes:

The development team has announced the release of Zaptel versions 1.2.19 and 1.4.4. These releases are maintenance releases that fix various known issues. See the ChangeLog included in the releases for a full list of changes

Goto Download section for latest releases.