DOS: Asterisk Remote Memory Corruption

This signature detects attempts to exploit a known vulnerability against Asterisk. A successful attack can lead to Denial of Service.

Extended Description

An issue was discovered in chan_skinny.c in Asterisk Open Source 13.18.2 and older, 14.7.2 and older, and 15.1.2 and older, and Certified Asterisk 13.13-cert7 and older. If the chan_skinny (aka SCCP protocol) channel driver is flooded with certain requests, it can cause the asterisk process to use excessive amounts of virtual memory, eventually causing asterisk to stop processing requests of any kind.

Affected Products

Digium asterisk

Short Name
DOS:APPLICATION:ASTERISK-MC
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
DOS
Keywords
Asterisk CVE-2017-17090 Corruption Memory Remote bid:102023
Release Date
06/11/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
Port
TCP/2000
False Positive
Unknown
Vendors

Digium

CVSS Score

5.0

Found a potential security threat?