Home

Description

EN DE

A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

In Kamailio 5.5 ist eine Schwachstelle entdeckt worden. Betroffen ist die Funktion sr_push_yy_state der Datei src/core/cfg.lex der Komponente Configuration File Handler. Durch das Manipulieren mit unbekannten Daten kann eine use after free-Schwachstelle ausgenutzt werden. Der Angriff muss lokal durchgeführt werden. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-10-25 | Published 2025-10-27 | Updated 2025-10-28 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
4.3AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Use After Free

Memory Corruption

Timeline

2025-10-25:Advisory disclosed
2025-10-25:VulDB entry created
2025-10-25:VulDB entry last update

Credits

zh_vul (VulDB User) reporter

References

vuldb.com/?id.329875 (VDB-329875 | Kamailio Configuration File cfg.lex sr_push_yy_state use after free) vdb-entry technical-description

vuldb.com/?ctiid.329875 (VDB-329875 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.673225 (Submit #673225 | Kamailio Project Kamailio SIP Server 5.5 Use After Free) third-party-advisory

shimo.im/docs/ZzkLMVMLOzIRlpAQ/ exploit

cve.org (CVE-2025-12205)

nvd.nist.gov (CVE-2025-12205)

Download JSON