On Fri, Mar 09, 2012 at 03:10:50PM -0600, Kevin P. Fleming wrote:
> On 03/09/2012 02:56 PM, Josh Freeman wrote:
> >The most current patched Asterisk, along with the most current app_rpt,
> >can be found at
> >
> >http://svn.ohnosec.org/svn/projects/allstar/astsrc-1.4.23-pre/trunk/
> 
> I'm really trying to avoid fanning the flames here, but if that code
> is *really* based on 1.4.23, and hasn't been kept up to date with
> the Asterisk 1.4 releases, then that means it contains a number of
> security vulnerabilities that users should be aware of. Some of them
> are user enumeration vulnerabilities, but others (like AST-2011-010,
> AST-2011-005, AST-2011-001, and maybe more) are more serious.

http://patch-tracker.debian.org/package/asterisk/1:1.4.21.2~dfsg-3+lenny5
Or:
http://anonscm.debian.org/viewvc/pkg-voip/asterisk/branches/lenny-security/debian/patches/

Those are the patches for the Asterisk package in Debian 5.0 (Lenny). It
is based on 1.4.21.2 (though with some extra patches: part of the
bristuff patch). At least for a while I tried to check every security
fix to see if it applies to Lenny.

-- 
               Tzafrir Cohen
icq#16849755              jabber:tzafrir.co...@xorcom.com
+972-50-7952406           mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir

--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to