<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Phpseclib (&gt;= 3.0.0, &lt;= 3.0.51) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/phpseclib--3.0.0--3.0.51/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 May 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/phpseclib--3.0.0--3.0.51/feed.xml" rel="self" type="application/rss+xml"/><item><title>phpseclib OID Amplification DoS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-05-phpseclib-dos/</link><pubDate>Mon, 06 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-phpseclib-dos/</guid><description>A vulnerability exists in phpseclib when loading untrusted ASN1 files, potentially leading to an OID amplification denial-of-service (DoS) in the ASN1::decodeOID() function.</description><content:encoded><![CDATA[<p>A denial-of-service vulnerability exists in the phpseclib library, affecting versions 0.0.11 through 1.0.28, 2.0.0 through 2.0.53, and 3.0.0 through 3.0.51. The vulnerability stems from improper handling of ASN.1 files, specifically during the <code>decodeOID()</code> function. When an application using a vulnerable version of phpseclib loads a crafted, malicious ASN.1 file (e.g., an X.509 certificate or RSA PKCS8 key), it can trigger excessive resource consumption, leading to a denial-of-service condition. This is due to the OID amplification. Successful exploitation can prevent legitimate users from accessing the affected service or application. Defenders should upgrade to the patched versions of phpseclib to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious ASN.1 file containing an overly complex or deeply nested OID structure.</li>
<li>The attacker delivers the crafted ASN.1 file to a system running a vulnerable application that uses phpseclib for ASN.1 parsing. This could be achieved through various means, such as uploading the file to a web server, emailing it as an attachment, or injecting it into a database.</li>
<li>The vulnerable application loads the crafted ASN.1 file using phpseclib.</li>
<li>phpseclib&rsquo;s <code>ASN1::decodeOID()</code> function is called to parse the OID within the ASN.1 file.</li>
<li>Due to the overly complex structure of the malicious OID, the <code>decodeOID()</code> function consumes excessive CPU and memory resources.</li>
<li>The excessive resource consumption degrades the performance of the application and the underlying system.</li>
<li>Repeated attempts to load the malicious ASN.1 file further exacerbate the resource exhaustion, leading to a denial-of-service condition.</li>
<li>Legitimate users are unable to access the application or service, causing disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial-of-service condition, rendering applications relying on phpseclib unavailable. The impact is high, as affected applications could be critical infrastructure or business-critical services. The number of potential victims is significant, as phpseclib is a widely used library in PHP-based applications. This vulnerability is particularly concerning for applications that handle untrusted ASN.1 files, such as those involved in certificate validation or cryptographic key management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>composer/phpseclib/phpseclib</code> package to a patched version (later than 1.0.28, 2.0.53, and 3.0.51) to remediate CVE-2026-44167.</li>
<li>Monitor web server logs (category <code>webserver</code>) for unusual patterns of ASN.1 file uploads or processing that may indicate an attempted exploitation.</li>
<li>Deploy the Sigma rule <code>Detect High CPU Usage by PHP</code> to identify potential DoS attacks related to this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>asn1</category><category>phpseclib</category></item></channel></rss>