[asterisk-bugs] [Asterisk 0019109]: Console flooding caused by bad remote SIP peer

Asterisk Bug Tracker noreply at bugs.digium.com
Wed Apr 13 09:04:19 CDT 2011


The following issue has been UPDATED. 
====================================================================== 
https://issues.asterisk.org/view.php?id=19109 
====================================================================== 
Reported By:                aragon
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   19109
Category:                   Channels/chan_sip/Registration
Reproducibility:            have not tried
Severity:                   minor
Priority:                   normal
Status:                     closed
Asterisk Version:           1.4.40 
JIRA:                        
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
Resolution:                 no change required
Fixed in Version:           
====================================================================== 
Date Submitted:             2011-04-12 15:25 CDT
Last Modified:              2011-04-13 09:04 CDT
====================================================================== 
Summary:                    Console flooding caused by bad remote SIP peer
Description: 
Console is flooded by remote SIP peer.
This appears to be a Denial of Service attack using a mis-configured
remote SIP peer with no valid peer defined in Asterisk.
====================================================================== 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2011-04-13 09:04 lmadsen        Status                   new => closed       
2011-04-13 09:04 lmadsen        Resolution               open => no change
required
======================================================================




More information about the asterisk-bugs mailing list