Vulnerability & Exploit Database

Back to search

FreeBSD: VID-E91CF90C-D6DD-11E7-9D10-001999F8D30B: asterisk -- DOS Vulnerability in Asterisk chan_skinny

Severity CVSS Published Added Modified
4 (AV:L/AC:M/Au:N/C:P/I:P/A:P) November 30, 2017 December 02, 2017 December 02, 2017

Description

The Asterisk project reports:

If the chan_skinny (AKA SCCP protocol) channel driver

is flooded with certain requests it can cause the asterisk

process to use excessive amounts of virtual memory

eventually causing asterisk to stop processing requests

of any kind.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial

Solution

freebsd-upgrade-package-asterisk13