pkgsrc/comms/asterisk16
jnemeth a41223dfd0 Update to 1.6.2.16.1
This is to fix AST-2011-001: Stack buffer overflow in SIP channel driver

               Asterisk Project Security Advisory - AST-2011-001

         Product        Asterisk
         Summary        Stack buffer overflow in SIP channel driver
    Nature of Advisory  Exploitable Stack Buffer Overflow
      Susceptibility    Remote Authenticated Sessions
         Severity       Moderate
      Exploits Known    No
       Reported On      January 11, 2011
       Reported By      Matthew Nicholson
        Posted On       January 18, 2011
     Last Updated On    January 18, 2011
     Advisory Contact   Matthew Nicholson <mnicholson at digium.com>
         CVE Name

   Description When forming an outgoing SIP request while in pedantic mode, a
               stack buffer can be made to overflow if supplied with
               carefully crafted caller ID information. This vulnerability
               also affects the URIENCODE dialplan function and in some
               versions of asterisk, the AGI dialplan application as well.
               The ast_uri_encode function does not properly respect the size
               of its output buffer and can write past the end of it when
               encoding URIs.

For full details, see:

http://downloads.digium.com/pub/security/AST-2011-001.html
2011-01-21 05:13:12 +00:00
..
files The stop and reload commands require the core prefix now. 2010-11-29 04:20:32 +00:00
patches Update to 1.6.2.16: 2011-01-16 06:30:56 +00:00
DESCR
distinfo Update to 1.6.2.16.1 2011-01-21 05:13:12 +00:00
Makefile Update to 1.6.2.16.1 2011-01-21 05:13:12 +00:00
MESSAGE
options.mk DISTFILES is now initialized in Makefile, don't re-initialize it here. 2010-10-06 22:39:41 +00:00
PLIST Update to 1.6.2.15. This is primarily a bugfix release. 2010-12-12 10:19:44 +00:00