Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.0.5 and 5.8.7, an out-of-bounds read in the auth module of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted SIP packet if a successful user authentication without a database backend is followed by additional user identity checks. This vulnerability is fixed in 6.0.5 and 5.8.7.
References
| Link | Resource |
|---|---|
| https://github.com/kamailio/kamailio/security/advisories/GHSA-6m86-m342-g48m | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Apr 2026, 16:06
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:* | |
| References | () https://github.com/kamailio/kamailio/security/advisories/GHSA-6m86-m342-g48m - Vendor Advisory | |
| First Time |
Kamailio
Kamailio kamailio |
08 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 20:16
Updated : 2026-04-15 16:06
NVD link : CVE-2026-39864
Mitre link : CVE-2026-39864
CVE.ORG link : CVE-2026-39864
JSON object : View
Products Affected
kamailio
- kamailio
CWE
CWE-125
Out-of-bounds Read
