DEBIAN-CVE-2025-12207

Source
https://security-tracker.debian.org/tracker/CVE-2025-12207
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12207.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-12207
Upstream
Published
2025-10-27T03:15:49.937Z
Modified
2026-03-17T02:51:03.246035Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The actual existence of this vulnerability is currently in question. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Debian:11 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.4.4-1
5.5.3-1
5.5.3-2
5.5.4-1
5.6.0-2
5.6.1-1
5.6.2-1
5.6.3-1
5.6.3-2
5.6.4-1
5.7.0-1
5.7.2-1
5.7.3-1
5.7.4-1
5.8.2-2
5.8.2-3
5.8.2-4
5.8.3-1
5.8.4-1
5.8.5-1
6.*
6.0.0-1
6.0.1-1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1
6.0.5-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12207.json"

Debian:12 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.6.3-2
5.6.4-1
5.7.0-1
5.7.2-1
5.7.3-1
5.7.4-1
5.8.2-2
5.8.2-3
5.8.2-4
5.8.3-1
5.8.4-1
5.8.5-1
6.*
6.0.0-1
6.0.1-1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1
6.0.5-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12207.json"

Debian:13 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.1-1
6.0.1-1+deb13u1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1
6.0.5-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12207.json"

Debian:14 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.1-1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1
6.0.5-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12207.json"