FreeBSD : asterisk -- DOS Vulnerability in Asterisk chan_skinny (e91cf90c-d6dd-11e7-9d10-001999f8d30b)
Medium Nessus Plugin ID 104985
SynopsisThe remote FreeBSD host is missing a security-related update.
DescriptionThe Asterisk project reports :
If the chan_skinny (AKA SCCP protocol) channel driver is flooded with certain requests it can cause the asterisk process to use excessive amounts of virtual memory eventually causing asterisk to stop processing requests of any kind.
SolutionUpdate the affected package.