The Asterisk Development Team has announced security releases for Certified Asterisk 13.13 and Asterisk 13 and 14. The available security releases are released as versions 13.13-cert3, 13.14.1, and 14.3.1.
These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The release of these versions resolves the following security vulnerabilities: * AST-2017-001: Buffer overflow in CDR's set user No size checking is done when setting the user field on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. This allows the possibility of remote code injection. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/certified- asterisk/releases/ChangeLog-13.13-cert3 http://downloads.asterisk.org/pub/telephony/asterisk/ releases/ChangeLog-13.14.1 http://downloads.asterisk.org/pub/telephony/asterisk/ releases/ChangeLog-14.3.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2017-001.pdf Thank you for your continued support of Asterisk!
-- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- Check out the new Asterisk community forum at: https://community.asterisk.org/ New to Asterisk? Start here: https://wiki.asterisk.org/wiki/display/AST/Getting+Started asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users