A user of the Asterisk Manager Interface can bypass a security check and execute shell commands when they lack permission to do so. Under normal conditions, a user should only be able to run shell commands if that user has System class authorizati..
_____ From: email@example.com [mailto:firstname.lastname@example.org] On Behalf Of Vinícius Fontes Sent: Wednesday, March 16, 2011 5:02 PM To: Asterisk Users Mailing List – Non-Commercial Discussion Subject: Re: [asterisk-use..
All, As one with theoretical knowledge in programing, but never on Linux, I can understand terms and code structure but I dont know: 1. What shell commands (e.g. ./configure, make, make install etc.) should I run to recompile Asterisk (same versio..