Description
An issue was discovered in chan_skinny.c in Asterisk Open Source 13.18.2 and older, 14.7.2 and older, and 15.1.2 and older, and Certified Asterisk 13.13-cert7 and older. If the chan_skinny (aka SCCP protocol) channel driver is flooded with certain requests, it can cause the asterisk process to use excessive amounts of virtual memory, eventually causing asterisk to stop processing requests of any kind.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1225-1 | asterisk security update |
Debian DSA |
DSA-4076-1 | asterisk security update |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:43:59.739Z
Reserved: 2017-12-01T00:00:00.000Z
Link: CVE-2017-17090
No data.
Status : Deferred
Published: 2017-12-02T00:29:00.247
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-17090
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA