exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from gjoseph

Email addressgjoseph at digium.com
First Active2019-11-21
Last Active2021-02-19
Asterisk Project Security Advisory - AST-2021-004
Posted Feb 19, 2021
Authored by gjoseph, Edvin Vidmar | Site asterisk.org

Due to a signedness comparison mismatch, an authenticated WebRTC client could cause a stack overflow and Asterisk crash by sending multiple hold/unhold requests in quick succession.

tags | advisory, overflow
advisories | CVE-2021-26714
SHA-256 | 514c38f88457c5adefa470f62cfa4733ee26d4eda6458c3b24c7bb21f2ec9701
Asterisk Project Security Advisory - AST-2021-003
Posted Feb 19, 2021
Authored by Alexander Traud, gjoseph | Site asterisk.org

An unauthenticated remote attacker could replay SRTP packets which could cause an Asterisk instance configured without strict RTP validation to tear down calls prematurely.

tags | advisory, remote
advisories | CVE-2021-26712
SHA-256 | c6b2cb980ac1c471ada712a10083d5e4a2f109aa8638a11055f9f18afbbc09ab
Asterisk Project Security Advisory - AST-2021-001
Posted Feb 19, 2021
Authored by gjoseph, Ivan Poddubny | Site asterisk.org

If a registered user is tricked into dialing a malicious number that sends lots of 181 responses to Asterisk, each one will cause a 181 to be sent back to the original caller with an increasing number of entries in the ???Supported??? header. Eventually the number of entries in the header exceeds the size of the entry array and causes a crash.

tags | advisory
advisories | CVE-2020-35776
SHA-256 | 2f45006a2c9afadddcf34831d258755849dc791b989f4dce2ef9bb09888bc8d9
Asterisk Project Security Advisory - AST-2019-007
Posted Nov 21, 2019
Authored by gjoseph | Site asterisk.org

Asterisk Project Security Advisory - A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.

tags | advisory, remote, arbitrary
advisories | CVE-2019-18610
SHA-256 | fda4a6a55d938370b2cff51231d5b5cedb7a698db9552d692348f87f6dd26560
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close