Kamailio

Kamailio

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 27.10.2025 02:32:17
  • Zuletzt bearbeitet 04.11.2025 22:16:06

A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The ...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 27.10.2025 02:32:12
  • Zuletzt bearbeitet 04.11.2025 22:16:06

A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and ...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 27.10.2025 02:32:07
  • Zuletzt bearbeitet 04.11.2025 22:16:05

A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated fro...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 27.10.2025 02:02:11
  • Zuletzt bearbeitet 04.11.2025 22:16:05

A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carri...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 15.03.2023 20:15:10
  • Zuletzt bearbeitet 27.02.2025 19:15:39

The Kamailio SIP before 5.5.0 server mishandles INVITE requests with duplicated fields and overlength tag, leading to a buffer overflow that crashes the server or possibly have unspecified other impact.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 18.11.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:39

Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamail...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 07.09.2018 14:29:03
  • Zuletzt bearbeitet 21.11.2024 03:53:09

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with an invalid Via header causes a segmentation fault and crashes Kamailio. The reason is missing input validation in the crcitt_string_array core function for calculating a CRC ...

Exploit
  • EPSS 1.21%
  • Veröffentlicht 31.07.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:44

In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with a double "To" header and an empty "To" tag causes a segmentation fault and crash. The reason is missing input validation in the "build_res_buf_from_sip_req" core function. Th...

  • EPSS 3.29%
  • Veröffentlicht 20.03.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:14:24

A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x before 5.0.6, and 5.1.x before 5.1.2. A specially crafted REGISTER message with a malformed branch or From tag triggers an off-by-one heap-based buffer overflow in the tmx_check_p...

  • EPSS 0.09%
  • Veröffentlicht 07.09.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The kamcmd administrative utility and default configuration in kamailio before 4.3.0 use /tmp/kamailio_ctl.