sthen 2219c0a40e Your regularly scheduled security update to asterisk-1.8.4.3
AST-2011-008: If a remote user sends a SIP packet containing a null,
Asterisk assumes available data extends past the null to the
end of the packet when the buffer is actually truncated when
copied. This causes SIP header parsing to modify data past
the end of the buffer altering unrelated memory structures.
This vulnerability does not affect TCP/TLS connections.
-- Resolved in 1.6.2.18.1 and 1.8.4.3

AST-2011-009: A remote user sending a SIP packet containing a Contact header
with a missing left angle bracket (<) causes Asterisk to
access a null pointer.
-- Resolved in 1.8.4.3

AST-2011-010: A memory address was inadvertently transmitted over the
network via IAX2 via an option control frame and the remote party would try
to access it.
-- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
2011-06-24 13:50:09 +00:00
..
2011-06-16 21:11:56 +00:00
2009-10-13 11:13:04 +00:00
2010-11-20 19:56:47 +00:00
2010-11-20 19:56:47 +00:00
2010-10-19 07:43:00 +00:00
2010-12-12 22:04:33 +00:00
2010-11-20 19:56:47 +00:00
2011-06-04 17:15:56 +00:00