NIXPKGS-2026-1034
GitHub issue
published on
Permalink
CVE-2026-39864
4.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
Kamailio Auth: Processing Vulnerability For Additional Authenticated User Identity Checks
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.0.5 and 5.8.7, an out-of-bounds read in the auth module of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted SIP packet if a successful user authentication without a database backend is followed by additional user identity checks. This vulnerability is fixed in 6.0.5 and 5.8.7.
References
-
https://github.com/kamailio/kamailio/security/advisories/GHSA-6m86-m342-g48m x_refsource_CONFIRM
Affected products
kamailio
- ==>= 6.0.0, < 6.0.5
- ==< 5.8.7
Package maintainers
-
@mawis Matthias Wimmer <m@tthias.eu>