Asterisk 0day Segfaultn8twj writes "IAX Control New exploit code documents another remote IAX2 resource exhaustion attack. This exploit attacks the IAX2 protocol, a service enabled by default on any Asterisk installation. Digium was notified of this vulnerability more than 30 days ago. This is not the first Asterisk IAX resource exhaustion vulnerability. The IAX POKE exploit was released in July 2008 at The Last HOPE conference in New York City."
Link to Original Source