Vulnerability & Exploit Database

Back to search

FreeBSD: VID-E91CF90C-D6DD-11E7-9D10-001999F8D30B: asterisk -- DOS Vulnerability in Asterisk chan_skinny

Severity CVSS Published Added Modified
4 (AV:L/AC:M/Au:N/C:P/I:P/A:P) November 29, 2017 December 01, 2017 December 01, 2017

Description

The Asterisk project reports:

If the chan_skinny (AKA SCCP protocol) channel driver

is flooded with certain requests it can cause the asterisk

process to use excessive amounts of virtual memory

eventually causing asterisk to stop processing requests

of any kind.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

Solution

freebsd-upgrade-package-asterisk13