Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 26 Jan 2015 21:12:03 +0100
From: Helmut Grohne <>
Cc: Victor Seva <>
Subject: kamailio: multiple /tmp file vulnerabilities


There are multiple /tmp file vulnerabilities to be found in the kamailio
SIP proxy. While many of these issues only affect configuration examples
or outdated components, some do affect the default configuration.

Initial disclosures: (2013) (2015)
Upstream issue:

At this point, three issues are well understood:
 * The kamctl administrative utility and default configuration would use
   /tmp/kamailio_fifo (#712083, 2013, fixed in Debian's kamailio
 * The kamcmd administrative utility and default configuration would use
   /tmp/kamailio_ctl (#775681, 2015, patch available).
 * The kamailio build process would use constant filenames in /tmp
   allowing to elevate privileges to the build user (#775681, 2015,
   patch available).

The combined patch can be found at:;filename=0001-fix-fifo-and-ctl-defaults-pointing-to-unsecure-tmp-d.patch;att=1;bug=775681

While the last issue definitely affects the upstream kamailio build,
arguably the first two issues are packaging specific. If they are
treated as such, it is worth noting that kamailio was never part of a
Debian stable release and thus this may not be worth issuing a CVE.

I would like to thank Victor Seva for his timely responses, kind
interaction and providing patches for all of these issues.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.