First page Back Continue Last page Graphics
Forced Call Teardown
Vulnerabilities:
- Most protocols are unencrypted and do not authenticate all packets
- The signaling channel can be monitored
Attack:
- Inject spoofed call tear-down messages into the signaling channel such as:
- SIP: BYE
- IAX: HANGUP (Frame type 0x06, Subclass 0x05)
Effect:
- DoS: A call in progress is forcibly closed.