CVE-2025-12204

A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kamailio:kamailio:5.5.0:*:*:*:*:*:*:*

History

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/10/27/12 -
  • () http://www.openwall.com/lists/oss-security/2025/10/28/1 -

03 Nov 2025, 23:17

Type Values Removed Values Added
Summary (en) A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. (en) A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
References
  • () https://www.openwall.com/lists/oss-security/2025/11/02/3 -

28 Oct 2025, 15:14

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:kamailio:kamailio:5.5.0:*:*:*:*:*:*:*
References () https://shimo.im/docs/loqeMWMyZGtpEYqn/ - () https://shimo.im/docs/loqeMWMyZGtpEYqn/ - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.329874 - () https://vuldb.com/?ctiid.329874 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.329874 - () https://vuldb.com/?id.329874 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.673224 - () https://vuldb.com/?submit.673224 - Third Party Advisory, VDB Entry
References () https://www.openwall.com/lists/oss-security/2025/10/27/8 - () https://www.openwall.com/lists/oss-security/2025/10/27/8 - Issue Tracking, Mailing List
First Time Kamailio kamailio
Kamailio

28 Oct 2025, 01:16

Type Values Removed Values Added
References
  • () https://www.openwall.com/lists/oss-security/2025/10/27/8 -

27 Oct 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-27 03:15

Updated : 2025-11-04 22:16


NVD link : CVE-2025-12204

Mitre link : CVE-2025-12204

CVE.ORG link : CVE-2025-12204


JSON object : View

Products Affected

kamailio

  • kamailio
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write