11 Commits

Author SHA1 Message Date
sthen
312710642c SECURITY update to Asterisk 1.8.12.2
AST-2012-007, AST-2012-008 fixed in the short-lived 1.8.12.1 release:

* A remotely exploitable crash vulnerability exists in the IAX2 channel
  driver if an established call is placed on hold without a suggested music
  class. Asterisk will attempt to use an invalid pointer to the music
  on hold class name, potentially causing a crash.

* A remotely exploitable crash vulnerability was found in the Skinny (SCCP)
  Channel driver. When an SCCP client closes its connection to the server,
  a pointer in a structure is set to NULL.  If the client was not in the
  on-hook state at the time the connection was closed, this pointer is later
  dereferenced. This allows remote authenticated connections the ability to
  cause a crash in the server, denying services to legitimate users.

Also from 1.8.12.2

* Resolve crash in subscribing for MWI notifications.

ASTOBJ_UNREF sets the variable to NULL after unreffing it, so the
variable should definitely not be used after that. To solve this in
the two cases that affect subscribing for MWI notifications, we
instead save the ref locally, and unref them in the error
conditions.
2012-05-30 22:45:26 +00:00
sthen
da50bb63f3 tweaks to the Asterisk port:
- add an extra file to PLIST-calendar
- add comments to the sample sip.conf showing how to hide version numbers
- fix use of _POSIX_THREAD_PRIORITY_SCHEDULING, from Brad
2012-05-30 22:41:30 +00:00
sthen
0de3a685c1 - add commented-out example settings for configuring a server behind nat
- be explicit in sample config that people should use strong secrets
2011-06-27 21:15:14 +00:00
sthen
a75f35b7f4 SECURITY update to 1.8.2.4 fixes AST-2011-002 buffer overflow
Workaround: add "t38pt_udptl = no" to the general section in sip.conf
(chan_ooh323 is also affected but we don't build that).
2011-03-02 12:53:11 +00:00
sthen
d9010697e4 Improve the sample dialplan;
- use ${FILTER(...)} to only permit digits; dialplan injection is bad, mmmkay
- ConfBridge sample based on information from Diego Casati
2010-04-10 12:45:35 +00:00
sthen
16b6df18f8 Major version update to 1.6.0.19. For more information about the
upgrade, see /usr/local/share/doc/asterisk/UPGRADE-1.6.txt

Particular thanks to fgsch@, ian@ and Michiel van Baak for help and testing.
2009-12-13 12:11:29 +00:00
sthen
9c5f5dcd0d major version update to 1.4.11, ok ian@ jolan@ 2007-09-05 22:42:52 +00:00
steven
6dc095d557 fix sample config file.
from maintainer Stuart Henderson, found by Steve, murdoch-technology
at bigpond dot com.
2006-06-15 06:39:50 +00:00
naddy
ca6257ce12 SECURITY:
Update to 1.2.9.1 which addresses a security vulnerability in the IAX2
channel driver (chan_iax2). The vulnerability affects all users with
IAX2 clients that might be compromised or used by a malicious user, and
can lead to denial of service attacks and random Asterisk server crashes
via a relatively trivial exploit.

From: maintainer Stuart Henderson <stu@spacehopper.org>
2006-06-12 19:04:10 +00:00
jolan
c7aee7ccf1 update to 1.0.9, ok jcs pval
most notably fixes an overflow in the management interface (which is not
enabled by default)
2005-08-15 17:36:06 +00:00
jolan
ea994b03de asterisk-1.0.0, open source pbx 2004-09-26 00:38:23 +00:00