Asterisk IAX2 Request Flood Remote Denial of Service Vulnerability

To exploit this issue, attackers may use readily available network utilities.


 

Privacy Statement
Copyright 2010, SecurityFocus