Description
A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
In Kamailio 5.5 wurde eine Schwachstelle gefunden. Hiervon betroffen ist die Funktion rve_destroy der Datei src/core/rvalue.c der Komponente Configuration File Handler. Mittels Manipulieren mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Die Ausnutzung wurde veröffentlicht und kann verwendet werden. Bisher konnte die Existenz der vermeintlichen Schwachstelle noch nicht eindeutig nachgewiesen werden.
Problem types
Timeline
| 2025-10-25: | Advisory disclosed |
| 2025-10-25: | VulDB entry created |
| 2025-11-04: | VulDB entry last update |
Credits
zh_vul (VulDB User)
References
www.openwall.com/lists/oss-security/2025/10/27/8
www.openwall.com/lists/oss-security/2025/10/27/12
www.openwall.com/lists/oss-security/2025/10/28/1
vuldb.com/?id.329874 (VDB-329874 | Kamailio Configuration File rvalue.c rve_destroy heap-based overflow)
vuldb.com/?ctiid.329874 (VDB-329874 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.673224 (Submit #673224 | Kamailio Project Kamailio SIP Server 5.5 Heap-based Buffer Overflow)
shimo.im/docs/loqeMWMyZGtpEYqn/
www.openwall.com/lists/oss-security/2025/11/02/3
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.