<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-45047 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45047/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 16:19:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45047/feed.xml" rel="self" type="application/rss+xml"/><item><title>Bird-lg-go Unbounded JSON Decode Denial of Service (CVE-2026-45047)</title><link>https://feed.craftedsignal.io/briefs/2026-05-bird-lg-go-oom/</link><pubDate>Mon, 11 May 2026 16:19:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bird-lg-go-oom/</guid><description>Bird-lg-go is vulnerable to a denial-of-service (DoS) attack (CVE-2026-45047) where an unauthenticated remote attacker can cause an out-of-memory error by streaming an extremely large JSON payload to the apiHandler, leading to termination of the bird-lg-go daemon.</description><content:encoded><![CDATA[<p>Bird-lg-go is susceptible to a denial-of-service vulnerability due to unbounded JSON decoding in the <code>apiHandler</code> function. Specifically, the application uses <code>json.NewDecoder(r.Body).Decode(&amp;request)</code> without implementing a maximum read size limit. This allows an unauthenticated remote attacker to send an arbitrarily large JSON payload to the application. The Go JSON decoder attempts to allocate memory for the entire parsed structure, and an attacker can exploit this by sending gigabytes of padded data, rapidly exhausting the available memory. This triggers a <code>fatal error: runtime: out of memory</code> condition, causing the Linux OOM Killer to terminate the <code>bird-lg-go</code> daemon, effectively creating a remote denial of service (RDoS). This affects bird-lg-go versions prior to commit 0ff87024cb9e.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker establishes a TCP connection to the bird-lg-go server.</li>
<li>The attacker sends an HTTP POST request to an endpoint handled by the <code>apiHandler</code> or <code>webHandlerTelegramBot</code>.</li>
<li>The HTTP request body contains a malicious JSON payload.</li>
<li>The attacker streams an extremely large, potentially endless, JSON payload without any size restrictions.</li>
<li>The <code>json.NewDecoder(r.Body).Decode(&amp;request)</code> function attempts to decode the JSON.</li>
<li>The Go JSON decoder allocates memory to store the decoded JSON structure.</li>
<li>The attacker&rsquo;s oversized payload exhausts the available memory.</li>
<li>The <code>bird-lg-go</code> process encounters a <code>fatal error: runtime: out of memory</code> condition and terminates due to the Linux OOM Killer.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability can cause a complete denial of service by crashing the <code>bird-lg-go</code> daemon. A single attacker can disrupt the service by exhausting the server&rsquo;s memory resources. The impact is significant as it affects the availability of the application. While the exact number of victims is not specified, any deployment of a vulnerable version of <code>bird-lg-go</code> is susceptible to this attack. Successful exploitation leads to service interruption until the daemon is manually restarted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of <code>bird-lg-go</code> containing the fix for CVE-2026-45047 to mitigate the unbounded JSON decoding vulnerability.</li>
<li>Implement resource limits, such as <code>http.MaxBytesReader</code>, to restrict the size of incoming HTTP request bodies to prevent excessive memory allocation, mitigating CVE-2026-45047.</li>
<li>Deploy the Sigma rule &ldquo;Detect Bird-lg-go Excessive JSON Payload&rdquo; to identify potentially malicious requests based on the size of the request body.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>json</category><category>CVE-2026-45047</category><category>linux</category></item></channel></rss>