Americas

  • United States

Asia

Oceania

roger_grimes
Columnist

Core Security finds Asterisk vulnerabilities

Analysis
Jun 12, 20061 min
Data and Information SecuritySecurity

CoreLabs finds two Asterisk vulnerabilities. Core Security's CoreLabs found two vulnerabilities (one works server side, both work client-side) in open source PBX software, Asteriskshttp://www.asterisk.org/. If you haven't heard about Asterisk, it's a pretty cool product. It allows developers and administrators to use open source Asterisk software to create their own PC-based PBX. The software interfaces with man

CoreLabs finds two Asterisk vulnerabilities.

Core Security’s CoreLabs found two vulnerabilities (one works server side, both work client-side) in open source PBX software, Asteriskshttps://www.asterisk.org/.

If you haven’t heard about Asterisk, it’s a pretty cool product. It allows developers and administrators to use open source Asterisk software to create their own PC-based PBX. The software interfaces with many industry standards and PBX-specific cards. An entire cottage industry has popped up around Asterisk, offering great PBX functionality for cheap.

Anyway, Core Security, the makers of the CORE IMPACT https://www.coresecurity.com/products/coreimpact/index.php vulnerability scanner found two new vulnerabilities in Asterisk and the related IAX2 protocol for sending video.

CoreLabs decided to do a manual source code review after running into a few clients that had the Asterisk product. They notified Asterisk and three days later an official patch was released.

Kudos to CoreLabs for doing free open source security code review and kudos to Asterisk for responding quickly to the problem.

If an open source PBX solution sounds interesting, check out Asterisk.

roger_grimes
Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

More from this author