-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Tzafrir Cohen wrote: > Note that the issue "exists in the code" in 1.2.11 just as it has > existed in 1.2.10 and before. And has much larger potential impact (as > usual) if Asterisk is run as root.
Can you expand a little? Is 1.2.11 still vulnerable? - -- Cheers, Matt Riddell _______________________________________________ http://www.sineapps.com/news.php (Daily Asterisk News - html) http://freevoip.gedameurope.com (Free Asterisk Voip Community) http://www.sineapps.com/rssfeed.php (Daily Asterisk News - rss) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFE8VI3S6d5vy0jeVcRAqXYAJ9ifhXGIqjhAjB+XKgZpbmQDLzCvACeJUN7 FL/9YDiAOanNQRvYVuRGeLc= =Ek83 -----END PGP SIGNATURE----- _______________________________________________ --Bandwidth and Colocation provided by Easynews.com -- Asterisk-Security mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-security
