DEBIAN-CVE-2025-12206

Source
https://security-tracker.debian.org/tracker/CVE-2025-12206
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12206.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-12206
Upstream
Published
2025-10-27T03:15:49.750Z
Modified
2025-11-17T04:31:41.784569Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw has been found in Kamailio 5.5. The impacted element is the function rveisconstant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. It is still unclear if this vulnerability genuinely exists. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Debian:11 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.4.4-1
5.5.3-1
5.5.3-2
5.5.4-1
5.6.0-2
5.6.1-1
5.6.2-1
5.6.3-1
5.6.3-2
5.6.4-1
5.7.0-1
5.7.2-1
5.7.3-1
5.7.4-1
5.8.2-2
5.8.2-3
5.8.2-4
5.8.3-1
5.8.4-1
5.8.5-1
6.*
6.0.0-1
6.0.1-1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12206.json"

Debian:12 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.6.3-2
5.6.4-1
5.7.0-1
5.7.2-1
5.7.3-1
5.7.4-1
5.8.2-2
5.8.2-3
5.8.2-4
5.8.3-1
5.8.4-1
5.8.5-1
6.*
6.0.0-1
6.0.1-1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12206.json"

Debian:13 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.1-1
6.0.1-1+deb13u1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12206.json"

Debian:14 / kamailio

Package

Name
kamailio
Purl
pkg:deb/debian/kamailio?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.1-1
6.0.2-1
6.0.2-2
6.0.2-3
6.0.3-1
6.0.3-2
6.0.3-3
6.0.4-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-12206.json"