The TEST2 check of the originate timestamp in received packets, which requires the timestamp to match the value of the peer->aorg variable and which is supposed to be random to prevent spoofing attacks has been found to be faulty. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8138