I know it's been done... you're out there somewhere. Anyone want to publicly comment on when was the most recent "tiger team" style attack launched on Asterisk by highly-qualified stack overflow pirates? Or what were the results? I can't imagine that there are not glaring holes in the way that SIP is parsed, or in MGCP, or SCCP, or any of the other protocols that Asterisk so helpfully opens up on a system.

I'll anonymize any private replies and send back to the list, if desired.

JT
_______________________________________________
Asterisk-Security mailing list
[email protected]
http://lists.digium.com/mailman/listinfo/asterisk-security

Reply via email to