Kamailio 5.5 Configuration File src/core/cfg.lex sr_push_yy_state Pufferüberlauf ⚔ [Gaskiya ba a tabbatar da shi ba]

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Kamailio 5.5. Hakika, aikin sr_push_yy_state ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil src/core/cfg.lex, a cikin sashen Configuration File Handler. A sa manipulation ka Pufferüberlauf. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-416. Hakika, rauni an bayyana shi 10/25/2025. An raba bayanin tsaro don saukewa a shimo.im. Wannan matsala ana saninta da CVE-2025-12205. Wuroo ka a yiɗi a yi ɗum e laawol gese. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga shimo.im. 0-day shima, an ndiyam a wuro be $0-$5k. A halin yanzu, akwai shakku game da ainihin wanzuwar wannan raunin. Wannan vulnerability an kuma samu a wasu kundin bayanan vulnerability: Tenable (271819). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

6 Goyarwa · 104 Datenpunkte

FurɗeGargadi 1/5
10/27/2025 04:57
Gargadi 2/5
10/27/2025 05:50
Gargadi 3/5
10/29/2025 04:00
Gargadi 4/5
11/01/2025 19:41
Gargadi 5/5
11/04/2025 00:05
software_nameKamailioKamailioKamailioKamailioKamailio
software_version5.55.55.55.55.5
software_componentConfiguration File HandlerConfiguration File HandlerConfiguration File HandlerConfiguration File HandlerConfiguration File Handler
software_filesrc/core/cfg.lexsrc/core/cfg.lexsrc/core/cfg.lexsrc/core/cfg.lexsrc/core/cfg.lex
software_functionsr_push_yy_statesr_push_yy_statesr_push_yy_statesr_push_yy_statesr_push_yy_state
vulnerability_cweCWE-416 (Pufferüberlauf)CWE-416 (Pufferüberlauf)CWE-416 (Pufferüberlauf)CWE-416 (Pufferüberlauf)CWE-416 (Pufferüberlauf)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/https://shimo.im/docs/ZzkLMVMLOzIRlpAQ/
source_cveCVE-2025-12205CVE-2025-12205CVE-2025-12205CVE-2025-12205CVE-2025-12205
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore4.34.34.34.34.3
cvss2_vuldb_tempscore3.73.73.73.73.7
cvss3_vuldb_basescore5.35.35.35.35.3
cvss3_vuldb_tempscore4.84.84.84.84.8
cvss3_meta_basescore5.35.36.16.16.1
cvss3_meta_tempscore5.05.06.06.06.0
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avLLLLL
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prLLLLL
cvss4_cna_uiNNNNN
cvss4_cna_vcLLLLL
cvss4_cna_viLLLLL
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore4.84.84.84.84.8
cvss3_cna_avLLLLL
cvss3_cna_acLLLLL
cvss3_cna_prLLLLL
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cLLLLL
cvss3_cna_iLLLLL
cvss3_cna_aLLLLL
cvss3_cna_basescore5.35.35.35.35.3
cvss2_cna_avLLLLL
cvss2_cna_acLLLLL
cvss2_cna_auSSSSS
cvss2_cna_ciPPPPP
cvss2_cna_iiPPPPP
cvss2_cna_aiPPPPP
cvss2_cna_basescore4.34.34.34.34.3
euvd_idEUVD-2025-36071EUVD-2025-36071EUVD-2025-36071EUVD-2025-36071
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prLLL
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cHHH
cvss3_nvd_iHHH
cvss3_nvd_aHHH
cvss3_nvd_basescore7.87.87.8
nessus_id271819271819
nessus_nameLinux Distros Unpatched Vulnerability : CVE-2025-12205Linux Distros Unpatched Vulnerability : CVE-2025-12205
advisory_disputed1
source_mischttps://www.openwall.com/lists/oss-security/2025/11/02/3
decision_summaryThis attack requires manipulating config files which might not be a realistic scenario in many cases.

Do you want to use VulDB in your project?

Use the official API to access entries easily!