<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-6664 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6664/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 19:31:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6664/feed.xml" rel="self" type="application/rss+xml"/><item><title>Actively Exploited Integer Overflow in PgBouncer (CVE-2026-6664)</title><link>https://feed.craftedsignal.io/briefs/2026-05-pgbouncer-overflow/</link><pubDate>Wed, 20 May 2026 19:31:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pgbouncer-overflow/</guid><description>PgBouncer versions prior to 1.25.2 are vulnerable to an integer overflow (CVE-2026-6664), enabling unauthenticated remote attackers to trigger a denial-of-service via a crafted SCRAM authentication packet, with active exploitation reported.</description><content:encoded><![CDATA[<p>PgBouncer, a widely used open-source connection pooler for PostgreSQL, is affected by an actively exploited integer overflow vulnerability (CVE-2026-6664) in versions prior to 1.25.2. Discovered in early May 2026, this vulnerability allows remote attackers to crash the system without authentication or user interaction. A publicly available proof of concept exists, and reports indicate active exploitation. The vulnerability is located within the network packet processing code and involves an integer overflow, leading to a bypass of boundary checks. Successful exploitation leads to a denial-of-service condition, impacting system availability. Defenders should prioritize patching vulnerable instances and enhance monitoring capabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PgBouncer instance running a version prior to 1.25.2.</li>
<li>Attacker crafts a malicious SCRAM authentication packet specifically designed to trigger the integer overflow.</li>
<li>Attacker sends the crafted SCRAM packet to the vulnerable PgBouncer instance.</li>
<li>PgBouncer processes the packet, and the integer overflow occurs during the handling of network package sizes.</li>
<li>The integer overflow leads to a bypass of boundary checks in the network packet processing logic.</li>
<li>Due to the bypassed boundary checks, the application attempts to access an invalid memory location.</li>
<li>The invalid memory access causes a system crash, resulting in a denial-of-service.</li>
<li>The PgBouncer service becomes unavailable, disrupting applications relying on database connections managed by PgBouncer.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Exploitation of CVE-2026-6664 results in a denial-of-service condition, impacting the availability of systems utilizing vulnerable PgBouncer instances. While confidentiality and integrity are not directly affected, the disruption of database connections can severely impact applications and services that rely on PostgreSQL databases. There are reports of active exploitation of this vulnerability. Organizations failing to patch are at risk of service disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all PgBouncer instances to version 1.25.2 or later to remediate CVE-2026-6664 (<a href="https://www.pgbouncer.org/changelog.html#pgbouncer-125x)">https://www.pgbouncer.org/changelog.html#pgbouncer-125x)</a>.</li>
<li>Implement and tune the Sigma rule &ldquo;Detect CVE-2026-6664 Exploitation Attempt - Malformed SCRAM Packet&rdquo; to identify potentially malicious SCRAM authentication packets targeting PgBouncer instances.</li>
<li>Monitor network traffic for abnormally sized or malformed SCRAM authentication packets directed at PgBouncer instances as described in the vulnerability description.</li>
<li>Review the vulnerability details provided by NIST (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6664">https://nvd.nist.gov/vuln/detail/CVE-2026-6664</a>) and Exploit-DB (<a href="https://exploit-intel.com/vuln/CVE-2026-6664">https://exploit-intel.com/vuln/CVE-2026-6664</a>) for more information.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>integer overflow</category><category>denial of service</category><category>CVE-2026-6664</category></item></channel></rss>