<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gobgp/V4 (4.4.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/gobgp/v4-4.4.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 18:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/gobgp/v4-4.4.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>GoBGP Remote Denial of Service via Malformed BGP Update Message</title><link>https://feed.craftedsignal.io/briefs/2024-01-gobgp-dos/</link><pubDate>Tue, 09 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gobgp-dos/</guid><description>GoBGP version 4.4.0 is vulnerable to a remote denial-of-service attack where a malformed BGP UPDATE message triggers a nil pointer dereference, crashing the GoBGP process.</description><content:encoded><![CDATA[<p>GoBGP version 4.4.0 is susceptible to a denial-of-service (DoS) vulnerability that can be exploited by unauthenticated remote BGP peers. This flaw arises from improper handling of malformed BGP UPDATE messages, specifically those containing inconsistent attribute lengths. When a GoBGP server receives such a message, it incorrectly transitions to a &ldquo;withdraw&rdquo; action, leading to a nil pointer dereference in the <code>AdjRib.Update</code> function. This dereference causes a fatal panic, crashing the entire GoBGP process and resulting in a complete loss of BGP service availability. This vulnerability allows an attacker to disrupt network routing and potentially cause significant network outages.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated remote BGP peer establishes a BGP connection with the vulnerable GoBGP server.</li>
<li>The attacker crafts a malicious BGP UPDATE message with inconsistent attribute lengths.</li>
<li>The crafted UPDATE message is sent to the GoBGP server over the established BGP session.</li>
<li>The <code>handleUpdate</code> function in <code>pkg/server/peer.go</code> processes the received message.</li>
<li>Due to the malformed attributes, the message is treated as a withdrawal.</li>
<li>The <code>AdjRib.Update</code> function in <code>internal/pkg/table/adj.go</code> is called.</li>
<li>At line 127 of <code>adj.go</code>, the code attempts to access a member of a nil pointer, causing a panic.</li>
<li>The GoBGP process crashes, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a complete denial of BGP service, as the GoBGP process crashes. This can disrupt network routing, potentially leading to significant network outages and impacting any services relying on BGP. The vulnerability affects GoBGP version 4.4.0. While the exact number of affected installations is unknown, any network relying on a vulnerable GoBGP instance is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of GoBGP that addresses CVE-2026-42285.</li>
<li>Implement the Sigma rule &ldquo;Detect GoBGP Crash via Nil Pointer Dereference&rdquo; to detect exploitation attempts in real-time based on log messages.</li>
<li>Monitor BGP sessions from IP 192.168.31.195, as this address was involved in the proof-of-concept exploit.</li>
<li>Deploy the Sigma rule &ldquo;Detect Malformed BGP Update Messages&rdquo; to identify potentially malicious BGP UPDATE messages.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bgp</category><category>denial-of-service</category><category>networking</category></item></channel></rss>