CVE-2025-12205

A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kamailio:kamailio:5.5.0:*:*:*:*:*:*:*

History

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/10/27/12 -
  • () http://www.openwall.com/lists/oss-security/2025/10/27/8 -

03 Nov 2025, 23:17

Type Values Removed Values Added
References
  • () https://www.openwall.com/lists/oss-security/2025/11/02/3 -
Summary (en) A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

28 Oct 2025, 15:13

Type Values Removed Values Added
References () https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/ - () https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/ - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.329875 - () https://vuldb.com/?ctiid.329875 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.329875 - () https://vuldb.com/?id.329875 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.673225 - () https://vuldb.com/?submit.673225 - Third Party Advisory, VDB Entry
References () https://www.openwall.com/lists/oss-security/2025/10/27/8 - () https://www.openwall.com/lists/oss-security/2025/10/27/8 - Issue Tracking, Mailing List
CPE cpe:2.3:a:kamailio:kamailio:5.5.0:*:*:*:*:*:*:*
First Time Kamailio kamailio
Kamailio

28 Oct 2025, 01:16

Type Values Removed Values Added
References
  • () https://www.openwall.com/lists/oss-security/2025/10/27/8 -

27 Oct 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-27 03:15

Updated : 2025-11-04 22:16


NVD link : CVE-2025-12205

Mitre link : CVE-2025-12205

CVE.ORG link : CVE-2025-12205


JSON object : View

Products Affected

kamailio

  • kamailio
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-416

Use After Free