oss-sec mailing list archives
Re: CVE Request -- Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001)
From: Matthew Nicholson <mnicholson () digium com>
Date: Wed, 19 Jan 2011 07:36:46 -0600
On Wed, 2011-01-19 at 07:21 -0500, Steven M. Christey wrote:
On Wed, 19 Jan 2011, Jan Lieskovsky wrote:Asterisk upstream yesterday released AST-2011-001, also with patches for supported versions. References: [1] http://downloads.asterisk.org/pub/security/AST-2011-001.html [2] http://seclists.org/fulldisclosure/2011/Jan/297 [3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610487 [4] https://bugzilla.redhat.com/show_bug.cgi?id=670777Use CVE-2011-0495 - Steve
Our website has been updated with this information. -- Matthew Nicholson Digium, Inc. | Software Developer
Current thread:
- CVE Request -- Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001) Jan Lieskovsky (Jan 19)
- Re: CVE Request -- Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001) Steven M. Christey (Jan 19)
- Re: CVE Request -- Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001) Matthew Nicholson (Jan 19)
- Re: CVE Request -- Asterisk: Stack-based buffer overflow by forming an outgoing SIP request with specially-crafted caller ID information (AST-2011-001) Steven M. Christey (Jan 19)