I know it's been done... you're out there somewhere. Anyone want to publicly comment on when was the most recent "tiger team" style attack launched on Asterisk by highly-qualified stack overflow pirates? Or what were the results? I can't imagine that there are not glaring holes in the way that SIP is parsed, or in MGCP, or SCCP, or any of the other protocols that Asterisk so helpfully opens up on a system.
I'll anonymize any private replies and send back to the list, if desired. JT _______________________________________________ Asterisk-Security mailing list [email protected] http://lists.digium.com/mailman/listinfo/asterisk-security
