<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security Update Guide — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/security-update-guide/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 07:08:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/security-update-guide/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-6665 PgBouncer SCRAM Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pgbouncer-scram-overflow/</link><pubDate>Sun, 10 May 2026 07:08:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pgbouncer-scram-overflow/</guid><description>CVE-2026-6665 is a buffer overflow vulnerability in the PgBouncer's SCRAM implementation that could lead to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-6665 describes a buffer overflow vulnerability within the SCRAM (Salted Challenge Response Authentication Mechanism) implementation of PgBouncer, a lightweight connection pooler for PostgreSQL. An attacker could exploit this vulnerability by sending a specially crafted authentication request to PgBouncer, potentially leading to arbitrary code execution on the affected system. The Microsoft Security Response Center (MSRC) published information about this vulnerability. Successful exploitation could allow an attacker to gain unauthorized access to the database server and compromise sensitive data. Due to the nature of buffer overflows, exploitation can result in service disruption or complete system takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable PgBouncer instance.</li>
<li>The attacker initiates a connection to the PgBouncer instance.</li>
<li>The attacker begins the SCRAM authentication process.</li>
<li>The attacker sends a malicious SCRAM authentication message containing an oversized payload.</li>
<li>The oversized payload overflows the allocated buffer in PgBouncer&rsquo;s memory.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including executable code.</li>
<li>The attacker gains control of the execution flow by overwriting critical data or function pointers.</li>
<li>The attacker executes arbitrary code on the server, potentially gaining access to sensitive data or escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6665 allows a remote attacker to execute arbitrary code on the system running the vulnerable PgBouncer instance. This could lead to complete system compromise, data exfiltration, or denial of service. The impact of successful exploitation is high, as it can lead to unauthorized access to sensitive data, disruption of services, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided below to your SIEM to detect exploitation attempts.</li>
<li>Monitor network traffic for unusually large SCRAM authentication messages targeting PgBouncer instances (see network_connection rule).</li>
<li>Investigate and patch vulnerable PgBouncer instances immediately to prevent potential exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer overflow</category><category>pgbouncer</category><category>scram</category><category>rce</category></item></channel></rss>