CVE-2025-12207

A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The actual existence of this vulnerability is currently in question. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kamailio:kamailio:5.5.0:*:*:*:*:*:*:*

History

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/10/27/12 -
  • () http://www.openwall.com/lists/oss-security/2025/10/27/8 -

03 Nov 2025, 23:17

Type Values Removed Values Added
Summary (en) A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The actual existence of this vulnerability is currently in question. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
References
  • () https://www.openwall.com/lists/oss-security/2025/11/02/3 -

28 Oct 2025, 14:55

Type Values Removed Values Added
CPE cpe:2.3:a:kamailio:kamailio:5.5.0:*:*:*:*:*:*:*
First Time Kamailio kamailio
Kamailio
References () https://shimo.im/docs/vVqRMVMlrycMO63y/ - () https://shimo.im/docs/vVqRMVMlrycMO63y/ - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.329877 - () https://vuldb.com/?ctiid.329877 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.329877 - () https://vuldb.com/?id.329877 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.673241 - () https://vuldb.com/?submit.673241 - Third Party Advisory, VDB Entry
References () https://www.openwall.com/lists/oss-security/2025/10/27/8 - () https://www.openwall.com/lists/oss-security/2025/10/27/8 - Issue Tracking, Mailing List
References () https://shimo.im/docs/vVqRMVMlrycMO63y - () https://shimo.im/docs/vVqRMVMlrycMO63y - Exploit, Third Party Advisory

28 Oct 2025, 14:15

Type Values Removed Values Added
References
  • () https://shimo.im/docs/vVqRMVMlrycMO63y -

28 Oct 2025, 01:16

Type Values Removed Values Added
References
  • () https://www.openwall.com/lists/oss-security/2025/10/27/8 -

27 Oct 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-27 03:15

Updated : 2025-11-04 22:16


NVD link : CVE-2025-12207

Mitre link : CVE-2025-12207

CVE.ORG link : CVE-2025-12207


JSON object : View

Products Affected

kamailio

  • kamailio
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference