<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-45678 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45678/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:58:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45678/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenTelemetry eBPF Instrumentation Postgres Parser Vulnerable to Panic via Malformed BIND Payloads (CVE-2026-45678)</title><link>https://feed.craftedsignal.io/briefs/2026-05-otel-postgres-panic/</link><pubDate>Mon, 18 May 2026 17:58:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-otel-postgres-panic/</guid><description>The OpenTelemetry eBPF Instrumentation (OBI) Postgres protocol parser is vulnerable to a remote availability issue — when processing BIND messages, the parser assumes payloads contain a valid NUL-terminated portal name; a crafted empty or unterminated payload can cause OBI to slice beyond the end of the captured buffer, triggering a runtime panic and crashing the agent.</description><content:encoded><![CDATA[<p>The OpenTelemetry eBPF Instrumentation (OBI) is vulnerable to a denial-of-service attack due to improper handling of malformed Postgres BIND messages. The vulnerability, identified as CVE-2026-45678, resides in the Postgres protocol parser within OBI&rsquo;s eBPF component. Specifically, the parser incorrectly assumes that BIND message payloads contain a valid NUL-terminated portal name. By sending a crafted BIND message with either an empty payload or a payload lacking the NUL terminator, an attacker can cause the parser to read beyond the bounds of the buffer, triggering a runtime panic. This panic results in the OBI agent crashing, disrupting telemetry collection for the affected node or process. The issue affects OBI versions prior to 0.9.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a target system running OBI monitoring a Postgres database.</li>
<li>The attacker crafts a malformed Postgres BIND message. This message either contains an empty payload or lacks the expected NUL terminator after the portal name.</li>
<li>The attacker sends the crafted BIND message to the Postgres database server being monitored.</li>
<li>OBI intercepts the network traffic using eBPF and captures the malformed BIND message.</li>
<li>The OBI Postgres protocol parser attempts to process the BIND message payload in <code>pkg/ebpf/common/sql_detect_postgres.go</code>.</li>
<li>Due to the missing NUL terminator or empty payload, the <code>portalLen</code> calculation results in a value exceeding the buffer&rsquo;s boundaries.</li>
<li>The subsequent slice operation <code>msg.data[portalLen:]</code> triggers a &ldquo;slice bounds out of range&rdquo; runtime panic.</li>
<li>The OBI agent crashes, halting telemetry collection from the monitored system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, specifically impacting the availability of telemetry data. An attacker can repeatedly send malformed Postgres BIND messages to crash the OBI agent, effectively blinding monitoring systems and preventing the detection of other potential security incidents. This vulnerability primarily affects organizations using OBI for monitoring Postgres databases. The impact is a loss of visibility into database performance and security, potentially leading to delayed incident response and increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to OpenTelemetry eBPF Instrumentation version 0.9.0 or later to patch CVE-2026-45678.</li>
<li>Deploy the Sigma rule &ldquo;Detect OBI Postgres Parser Panic Attempt&rdquo; to identify attempts to exploit CVE-2026-45678 by detecting malformed Postgres BIND messages.</li>
<li>Monitor network traffic for unexpected patterns of malformed Postgres BIND messages indicative of exploitation attempts, and correlate with OBI agent crashes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>postgres</category><category>ebpf</category><category>CVE-2026-45678</category></item></channel></rss>