vulnerability

FreeBSD: VID-E91CF90C-D6DD-11E7-9D10-001999F8D30B: asterisk -- DOS Vulnerability in Asterisk chan_skinny

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Nov 30, 2017
Added
Dec 2, 2017
Modified
Feb 19, 2025

Description



The Asterisk project reports:



If the chan_skinny (AKA SCCP protocol) channel driver


is flooded with certain requests it can cause the asterisk


process to use excessive amounts of virtual memory


eventually causing asterisk to stop processing requests


of any kind.




Solution

freebsd-upgrade-package-asterisk13

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.