Impact
The Kamailio SIP server core contains an out-of-bounds memory access that allows remote attackers to trigger a process crash by sending a specially crafted packet over TCP or TLS. This flaw, classified as a buffer overflow (CWE-119), results in a denial of service that removes the instance from service and disrupts SIP signaling for all connected clients.
Affected Systems
Kamailio installations running any version older than 6.1.1, 6.0.6, or 5.8.8 are vulnerable, provided the server has a TCP or TLS listener enabled. The vulnerability was fixed in releases 5.1.1, 6.0.6, and 5.8.8; therefore any newer build that incorporates these updates is not affected.
Risk and Exploitability
The CVSS base score of 7.5 indicates a high severity denial-of-service flaw. EPSS data is not available, and the issue does not appear in CISA’s KEV catalog, implying no publicly known exploitation. Based on the description, it is inferred that an attacker needs only network connectivity to the exposed TCP/TLS port to send the malformed packet and trigger the crash.
OpenCVE Enrichment