* You are viewing Posts Tagged ‘noload’

Auto answer Asterisk ; Unable to create channel of type

To fix the issue below,
Edit /etc/asterisk/modules.conf
load => chan_alsa.so
noload => chan_oss.so
load => chan_console.so

Edit /etc/asterisk/extensions.conf
exten => s,1,Dial(Console/snd/controlC0,20,A(trek))

exten => s,2,Hangup

It worked perfect; one little issue that I have not fix is that
I have to use this command
#pulseaudio -vvvvvvvv
Restart asterisk and it worked but if pulseaudio is not on asterisk won’t
work, I’m in the process of fixing this issue.



problems getting chan_alsa.so to run

I am interisted to dial out from the console with chan_alsa. Can
somebody of you help me according this problem?!

I added user the asterisk to “pulse” and “pulse-access”, and it didn’t
change anything. alsa applications are routed by default to pulse.

cat /etc/asound.conf
pcm.!default {
type pulse

ctl.!default {
type pulse

What might be the problem?! Here is the ouptut:

office*CLI> module load chan_alsa.so
Unable to load module chan_alsa.so
Command ‘module load chan_alsa.so ‘ failed.
== Parsing ‘/etc/asterisk/alsa.conf': == Found
[Oct 20 21:54:16] ERROR[17849]: chan_alsa.c:180 alsa_card_init:
snd_pcm_open failed: Connection refused
[Oct 20 21:54:16] ERROR[17849]: chan_alsa.c:276 soundcard_init: Problem
opening alsa capture device
== No sound card detected — console channel will be unavailable
== Turn off ALSA support by adding ‘noload=chan_alsa.so’ in


Help Required—Problem in Installation without dahdi


Installation of dahdi requires kernel source that is not available with my remote virtual machine. Therefore I installed Asterisk without installing dahdi but when I start Asterisk it crashes while loading chan_agent.so (noload is also not useful in this case).

Any suggestions or hints to overcome this issue?


Multiple array overflow and crash vulnerabilities in UDPTL code

Asterisk Project Security Advisory – AST-2011-002

Product Asterisk
Summary Multiple array overflow and crash vulnerabilities in
UDPTL code
Nature of Advisory Exploitable Stack and Heap Array Overflows
Susceptibility Remote Unauthenticated Sessions
Severity Critical
Exploits Known No
Reported On January 27, 2011
Reported By Matthew Nicholson
Posted On February 21, 2011
Last Updated On February 21, 2011
Advisory Contact Matthew Nicholson
CVE Name

Description When decoding UDPTL packets, multiple stack and heap based
arrays can be made to overflow by specially crafted packets.
Systems doing T.38 pass through or termination are vulnerable.

Resolution The UDPTL decoding routines have been modified to respect the
limits of exploitable arrays.

In asterisk versions not containing the fix for this issue,
disabling T.38 support will prevent this vulnerability from
being exploited. T.38 support can be disabled in chan_sip by
setting the t38pt_udptl option to “no” (it is off by default).

t38pt_udptl = no

The chan_ooh323 module should also be disabled by adding the
following line in modles.conf.

noload => chan_ooh323

Affected Versions
Product Release Series
Asterisk Open Source 1.4.x All versions
Asterisk Open Source 1.6.x All versions
Asterisk Business Edition C.x.x All versions
AsteriskNOW 1.5 All versions
s800i (Asterisk Appliance) 1.2.x All versions

Corrected In
Product Release
Asterisk Open Source,,,
Asterisk Business Edition C.3.6.3

URL Branch
http://downloads.asterisk.org/pub/security/AST-2011-002-1.4.diff 1.4
http://downloads.asterisk.org/pub/security/AST-2011-002-1.6.1.diff 1.6.1
http://downloads.asterisk.org/pub/security/AST-2011-002-1.6.2.diff 1.6.2
http://downloads.asterisk.org/pub/security/AST-2011-002-1.8.diff 1.8


Asterisk Project Security Advisories are posted at

This document may be superseded by later versions; if so, the latest
version will be posted at
http://downloads.digium.com/pub/security/AST-2011-002.pdf and

Revision History
Date Editor Revisions Made
02/21/11 Matthew Nicholson Initial Release

Asterisk Project Security Advisory – AST-2011-002
Copyright (c) 2011 Digium, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its
original, unaltered form.

Modules still loaded after “noload”


I’m using Asterisk 1.4.20, and can’t have Asterisk not load modules I
don’t need:

> cat modules.conf
noload => codec_speex.c

ip04*CLI> reload
ip04*CLI> show modules

Just to check, I added the actual filename (.so):

> cat modules.conf
noload => codec_speex.c
noload => codec_speex.so

ip04*CLI> reload
ip04*CLI> show modules

> /etc/init.d/asterisk stop
> /etc/init.d/asterisk start
> asterisk -vvvr

ip04*CLI> show modules

Does someone know why Asterisk still loads modules even with the above
lines in modules.conf?

Thank you.