NIXPKGS-2026-1035
GitHub issue
published on
Permalink
CVE-2026-39863
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
Kamailio Core: TCP Data Processing Vulnerability
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. The issue impacts Kamailio instances having TCP or TLS listeners. This vulnerability is fixed in 5.1.1, 6.0.6, and 5.8.8.
References
-
https://github.com/kamailio/kamailio/security/advisories/GHSA-2wj4-f825-2h2f x_refsource_CONFIRM
Affected products
kamailio
- ==>= 6.0.0, < 6.0.6
- ==>= 6.1.0, < 6.1.1
- ==< 5.8.8
Package maintainers
-
@mawis Matthias Wimmer <m@tthias.eu>