Skip to content
Narrow screen resolution Wide screen resolution Auto adjust screen size Increase font size Decrease font size Default font size default color grey color red color blue color

Totek - Asterisk VoIP (SIP) News & Technology Source


 
Home
Asterisk 1.2.22/1.4.8 and Zaptel 1.2.19 /1.4.4 released PDF Print E-mail
User Rating: / 0
PoorBest 
Written by Web Master   
Sunday, 22 July 2007

From the Release Notes:

These releases contain fixes for four critical security vulnerabilities. One of these vulnerabilities is a remotely exploitable stack buffer overflow, which could allow an attacker to execute arbitrary code on the target machine. The other three are all remotely exploitable crash vulnerabilities.

We have released Asterisk Security Advisories for each of the vulnerabilities. The current version of each advisory can be downloaded from the ftp site.

ASA-2007-014
* Affected systems include those that bridge calls between chan_iax2 and any channel driver that uses RTP for media

ASA-2007-015
* Affected systems include any system that has chan_iax2 enabled

ASA-2007-016
* Affected systems include any system that has chan_skinny enabled

ASA-2007-017
* Affected systems include any 1.4 system that has any channel driver that uses RTP for media enabled

All users that have systems that meet any of the criteria listed above should upgrade as soon as possible.

Zaptel 1.2.19 and 1.4.4 Notes:

The Asterisk.org development team has announced the release of Zaptel versions 1.2.19 and 1.4.4. These releases are maintenance releases that fix various known issues. See the ChangeLog included in the releases for a full list of changes

Goto Download section for latest releases. 

 

 

Login Form






Lost Password?


Syndicate