Date: 08/03/06 (Security) Keywords: no keywords
Attackers could use the tools to disconnect calls, reassign extensions or flood VoIP systems with bogus calls.
Source: http://news.zdnet.com/2100-1009_22-6101610.html