Kamailio 5.5 Grammar Rule src/core/cfg.y yyerror_at ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ ⚔ [ପଚରାଉଚରା]

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu Kamailio 5.5 keessatti argameera. Kan miidhamte is hojii yyerror_at faayilii src/core/cfg.y keessa kutaa Grammar Rule Handler keessa. Hojii jijjiirraa gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-476 geessa. Dadhabbii kana yeroo 10/25/2025 maxxanfameera. Odeeffannoon kun buufachuuf shimo.im irratti qoodameera. Dogoggorri kun akka CVE-2025-12207tti beekama. Weerara sun iddoo keessaatti qofa raawwatamuu qaba. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Qorannoo miidhaa (exploit) uummataaf ifoomameera fi fayyadamamuu danda'a. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Carraa exploit kana shimo.im irraa buufachuun ni danda'ama. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Dhugaan balaa kanaa ammaaf shakkii keessa jira. Hanqinni kunis bu'uuraalee odeeffannoo hanqina biroo keessatti galmaa'ee jira: Tenable (271828). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

6 ଆଡାପ୍ଟେସନ୍ · 104 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 1/5
10/27/2025 04:57 AM
ଅଦ୍ୟତନ 2/5
10/27/2025 05:50 AM
ଅଦ୍ୟତନ 3/5
10/29/2025 04:00 AM
ଅଦ୍ୟତନ 4/5
11/01/2025 07:41 PM
ଅଦ୍ୟତନ 5/5
11/04/2025 12:06 AM
cvss2_vuldb_tempscore1.51.51.51.51.5
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.34.04.04.0
cvss3_meta_tempscore3.13.13.93.93.9
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_nameKamailioKamailioKamailioKamailioKamailio
software_version5.55.55.55.55.5
software_componentGrammar Rule HandlerGrammar Rule HandlerGrammar Rule HandlerGrammar Rule HandlerGrammar Rule Handler
software_filesrc/core/cfg.ysrc/core/cfg.ysrc/core/cfg.ysrc/core/cfg.ysrc/core/cfg.y
software_functionyyerror_atyyerror_atyyerror_atyyerror_atyyerror_at
vulnerability_cweCWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/https://shimo.im/docs/vVqRMVMlrycMO63y/
source_cveCVE-2025-12207CVE-2025-12207CVE-2025-12207CVE-2025-12207CVE-2025-12207
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.71.71.71.71.7
cve_nvd_summaryA vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avLLLLL
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prLLLLL
cvss4_cna_uiNNNNN
cvss4_cna_vcNNNNN
cvss4_cna_viNNNNN
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore4.84.84.84.84.8
cvss3_cna_avLLLLL
cvss3_cna_acLLLLL
cvss3_cna_prLLLLL
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cNNNNN
cvss3_cna_iNNNNN
cvss3_cna_aLLLLL
cvss3_cna_basescore3.33.33.33.33.3
cvss2_cna_avLLLLL
cvss2_cna_acLLLLL
cvss2_cna_auSSSSS
cvss2_cna_ciNNNNN
cvss2_cna_iiNNNNN
cvss2_cna_aiPPPPP
cvss2_cna_basescore1.71.71.71.71.7
euvd_idEUVD-2025-36068EUVD-2025-36068EUVD-2025-36068EUVD-2025-36068
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prLLL
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cNNN
cvss3_nvd_iNNN
cvss3_nvd_aHHH
cvss3_nvd_basescore5.55.55.5
nessus_id271828271828
nessus_nameLinux Distros Unpatched Vulnerability : CVE-2025-12207Linux Distros Unpatched Vulnerability : CVE-2025-12207
advisory_disputed1
source_mischttps://www.openwall.com/lists/oss-security/2025/11/02/3
decision_summaryThis attack requires manipulating config files which might not be a realistic scenario in many cases.

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!