<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>GoBGP (&lt;= 4.3.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/gobgp--4.3.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 07:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/gobgp--4.3.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>osrg GoBGP Integer Underflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</link><pubDate>Mon, 04 May 2026 07:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</guid><description>osrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.</description><content:encoded><![CDATA[<p>A vulnerability exists in osrg GoBGP, specifically in versions up to 4.3.0. The flaw is located within the <code>parseRibEntry</code> function of the <code>pkg/packet/mrt/mrt.go</code> file. This integer underflow vulnerability, identified as CVE-2026-7736, can be triggered remotely by an attacker who sends malicious or unexpected data to the affected function. Successful exploitation could lead to a denial-of-service condition or other unspecified consequences. Users are advised to upgrade to version 4.4.0, which contains the patch identified as 76d911046344a3923cbe573364197aa081944592, to mitigate the risk. The vulnerability poses a risk to network infrastructure relying on the BGP protocol, potentially impacting routing stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable GoBGP instance running a version prior to 4.4.0.</li>
<li>The attacker crafts a malicious MRT (Multi-Threaded Routing Toolkit) message.</li>
<li>The attacker sends the crafted MRT message to the vulnerable GoBGP instance. This is typically done over a TCP connection to the BGP port (179).</li>
<li>The <code>parseRibEntry</code> function processes the malicious MRT message.</li>
<li>Due to the integer underflow vulnerability, the <code>parseRibEntry</code> function calculates an incorrect value.</li>
<li>This incorrect value leads to unexpected behavior such as a crash or resource exhaustion.</li>
<li>The GoBGP process becomes unstable or terminates.</li>
<li>This disrupts BGP routing, potentially leading to a denial-of-service condition for network services that rely on BGP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow a remote attacker to disrupt BGP routing, leading to a denial-of-service condition. The precise impact will depend on the specific network configuration and the role of the affected GoBGP instance. Systems relying on the BGP protocol for routing information could experience connectivity issues or routing instability. While the number of affected deployments is unknown, any organization utilizing GoBGP in their network infrastructure is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 or later to remediate the integer underflow vulnerability described in CVE-2026-7736.</li>
<li>Monitor network traffic for unexpected MRT messages being sent to GoBGP instances using the Sigma rule provided below.</li>
<li>Review and harden BGP configurations to limit exposure and potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>integer underflow</category><category>bgp</category></item><item><title>GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in the osrg GoBGP software, specifically affecting versions up to 4.3.0. The vulnerability resides in the <code>PathAttributeAigp.DecodeFromBytes</code> function of the <code>pkg/packet/bgp/bgp.go</code> file, which is part of the AIGP Attribute Parser component. An attacker can remotely trigger this vulnerability by sending a crafted BGP message containing a malicious AIGP attribute. Successful exploitation could lead to arbitrary code execution on the affected system. GoBGP is an open source BGP implementation. Organizations using GoBGP for routing purposes should upgrade to version 4.4.0 or apply the provided patch (51ad1ada06cb41ce47b7066799981816f50b7ced) to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoBGP instance running a vulnerable version (&lt;= 4.3.0).</li>
<li>Attacker crafts a malicious BGP update message containing a specially crafted AIGP attribute.</li>
<li>The crafted AIGP attribute is designed to trigger a buffer overflow in the <code>PathAttributeAigp.DecodeFromBytes</code> function.</li>
<li>The attacker sends the malicious BGP update message to the vulnerable GoBGP instance over TCP port 179.</li>
<li>The GoBGP instance receives the message and attempts to parse the AIGP attribute using the vulnerable function.</li>
<li>The <code>PathAttributeAigp.DecodeFromBytes</code> function fails to properly validate the size of the input data, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code on the GoBGP instance, gaining control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected GoBGP instance. This can lead to a complete compromise of the routing infrastructure, allowing the attacker to intercept, modify, or disrupt network traffic. In service provider environments, this could affect a large number of customers and cause significant network outages. Given the CVSS v3.1 score of 7.3, this is considered a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 to remediate the vulnerability as mentioned in the overview.</li>
<li>Apply the patch <code>51ad1ada06cb41ce47b7066799981816f50b7ced</code> to the affected component to mitigate the vulnerability if upgrading is not immediately possible.</li>
<li>Monitor network traffic for BGP update messages with unusually large or malformed AIGP attributes, using a network intrusion detection system.</li>
<li>Deploy the Sigma rule detecting connections to port 179 from unusual sources to identify potentially malicious hosts attempting to exploit the vulnerability.</li>
<li>Review and harden BGP configuration to limit accepted peer connections to trusted sources only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7735</category><category>buffer-overflow</category><category>bgp</category></item></channel></rss>