Description
A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
In Kamailio 5.5 ist eine Schwachstelle entdeckt worden. Betroffen ist die Funktion sr_push_yy_state der Datei src/core/cfg.lex der Komponente Configuration File Handler. Durch das Manipulieren mit unbekannten Daten kann eine use after free-Schwachstelle ausgenutzt werden. Der Angriff muss lokal durchgeführt werden. Der Exploit steht zur öffentlichen Verfügung. Die reale Existenz dieser Sicherheitslücke ist momentan noch umstritten.
Problem types
Timeline
| 2025-10-25: | Advisory disclosed |
| 2025-10-25: | VulDB entry created |
| 2025-11-04: | VulDB entry last update |
Credits
zh_vul (VulDB User)
References
www.openwall.com/lists/oss-security/2025/10/27/8
www.openwall.com/lists/oss-security/2025/10/27/12
www.openwall.com/lists/oss-security/2025/10/27/8
vuldb.com/?id.329875 (VDB-329875 | Kamailio Configuration File cfg.lex sr_push_yy_state use after free)
vuldb.com/?ctiid.329875 (VDB-329875 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.673225 (Submit #673225 | Kamailio Project Kamailio SIP Server 5.5 Use After Free)
shimo.im/docs/ZzkLMVMLOzIRlpAQ/
www.openwall.com/lists/oss-security/2025/11/02/3
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.