vulnerability
FreeBSD: VID-FAB87BFF-3CE5-11E7-BF9D-001999F8D30B: asterisk -- Memory exhaustion on short SCCP packets
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Apr 13, 2017 | May 20, 2017 | Feb 19, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Apr 13, 2017
Added
May 20, 2017
Modified
Feb 19, 2025
Description
The Asterisk project reports:
A remote memory exhaustion can be triggered by sending
an SCCP packet to Asterisk system with "chan_skinny"
enabled that is larger than the length of the SCCP header
but smaller than the packet length specified in the header.
The loop that reads the rest of the packet doesn't detect
that the call to read() returned end-of-file before the
expected number of bytes and continues infinitely. The
"partial data" message logging in that tight loop causes
Asterisk to exhaust all available memory.
Solution
freebsd-upgrade-package-asterisk13
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.