Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-17090


An issue was discovered in chan_skinny.c in Asterisk Open Source 13.18.2 and older, 14.7.2 and older, and 15.1.2 and older, and Certified Asterisk 13.13-cert7 and older. If the chan_skinny (aka SCCP protocol) channel driver is flooded with certain requests, it can cause the asterisk process to use excessive amounts of virtual memory, eventually causing asterisk to stop processing requests of any kind.


Published

2017-12-02T00:29:00.247

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-459

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application digium certified_asterisk ≤ 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium certified_asterisk 13.13 Yes
Application digium asterisk ≤ 13.8.2 Yes
Application digium asterisk ≤ 14.7.2 Yes
Application digium asterisk ≤ 15.1.2 Yes

References