<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Double-Free — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/double-free/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 07:27:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/double-free/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-31507 Double-Free Vulnerability in net/smc</title><link>https://feed.craftedsignal.io/briefs/2024-05-cve-2026-31507/</link><pubDate>Thu, 23 Apr 2026 07:27:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-cve-2026-31507/</guid><description>CVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.</description><content:encoded><![CDATA[<p>On April 23, 2026, Microsoft published a security update guide addressing CVE-2026-31507, a double-free vulnerability residing in the net/smc (Sockets Multiplexing Controller) module of the Linux kernel. The vulnerability stems from a flaw in how the <code>tee()</code> function handles the duplication of splice pipe buffers. Specifically, when <code>tee()</code> duplicates a splice pipe buffer associated with the <code>smc_spd_priv</code> structure, it can lead to a double-free condition. This flaw could allow a local attacker to trigger memory corruption or a denial-of-service condition. While specific exploitation details are currently lacking, the nature of double-free vulnerabilities makes them a critical concern for system stability and security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local attacker gains access to the system.</li>
<li>The attacker crafts a malicious program that interacts with the net/smc module.</li>
<li>The program triggers the <code>tee()</code> function to duplicate a splice pipe buffer related to <code>smc_spd_priv</code>.</li>
<li>Due to the vulnerability, the same memory region associated with <code>smc_spd_priv</code> is freed twice.</li>
<li>The double-free corrupts the heap metadata.</li>
<li>Subsequent memory allocations may lead to arbitrary code execution or denial-of-service.</li>
<li>The attacker could leverage the memory corruption to escalate privileges.</li>
<li>Successful exploitation results in system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31507 can lead to memory corruption, potentially enabling arbitrary code execution and privilege escalation. A more likely outcome is a denial-of-service condition, where the system becomes unstable or crashes due to heap corruption. The vulnerability affects systems utilizing the affected net/smc module. While the number of potential victims is unknown, the wide deployment of the Linux kernel makes this a significant concern.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by Microsoft that addresses CVE-2026-31507 to mitigate the double-free vulnerability.</li>
<li>Monitor systems for unusual <code>tee()</code> function calls within the <code>net/smc</code> module using a process creation rule with relevant command-line arguments and process ancestry.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-31507</category><category>double-free</category><category>memory corruption</category><category>denial of service</category></item><item><title>CVE-2026-33824: Windows IKE Extension Double Free Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-ike-double-free/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ike-double-free/</guid><description>A double free vulnerability in the Windows IKE Extension, tracked as CVE-2026-33824, allows an unauthenticated remote attacker to execute arbitrary code over the network.</description><content:encoded><![CDATA[<p>CVE-2026-33824 is a critical vulnerability affecting the Windows Internet Key Exchange (IKE) Extension. This double-free vulnerability enables an unauthenticated attacker to execute arbitrary code on a vulnerable system remotely. The vulnerability stems from improper memory management within the IKE service. Successful exploitation could lead to complete system compromise, making it a high-priority concern for defenders. Microsoft has assigned a CVSS v3.1 score of 9.8 to this vulnerability. This issue was reported to Microsoft and assigned CVE-2026-33824. The affected systems are those running the Windows IKE Extension without the necessary security update.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted IKE packet to the target system.</li>
<li>The Windows IKE Extension processes the malicious IKE packet.</li>
<li>Due to a flaw in memory management, the IKE Extension attempts to free the same memory location twice (double-free).</li>
<li>The double-free condition corrupts the heap memory.</li>
<li>The attacker leverages the heap corruption to overwrite critical data structures.</li>
<li>The attacker gains control of program execution flow.</li>
<li>The attacker injects and executes arbitrary code within the context of the IKE service.</li>
<li>The attacker achieves remote code execution, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33824 allows a remote, unauthenticated attacker to execute arbitrary code on a vulnerable Windows system. Given the critical CVSS score of 9.8, the impact is severe. A compromised system could be used to steal sensitive data, establish a foothold for further network penetration, or cause a denial-of-service condition. Organizations that do not apply the patch released by Microsoft are at significant risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-33824 on all affected Windows systems immediately. Refer to the Microsoft advisory <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824</a>.</li>
<li>Monitor network traffic for suspicious IKE packets targeting your Windows systems. Deploy the network connection rule below to identify potential exploitation attempts.</li>
<li>Enable Windows event logging for the IKE service and deploy the process creation rule below to detect unexpected processes spawned by the IKE service.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-33824</category><category>windows</category><category>ike</category><category>double-free</category><category>remote-code-execution</category></item><item><title>CVE-2026-26179 Windows Kernel Double Free Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-26179-privesc/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-26179-privesc/</guid><description>CVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.</description><content:encoded><![CDATA[<p>CVE-2026-26179 is a critical security vulnerability residing within the Windows Kernel. This double-free vulnerability allows an attacker with local access to elevate their privileges. Successful exploitation grants the attacker higher-level permissions on the compromised system. The vulnerability was reported to Microsoft and assigned a CVSS v3.1 score of 7.8, indicating a high severity. The vulnerability lies within the core operating system components, making it a significant threat to Windows-based environments. Exploitation of this vulnerability requires an attacker to have valid local credentials on the target system. The vulnerability was published on 2026-04-14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial local access to a Windows system through legitimate credentials or by exploiting another vulnerability.</li>
<li>The attacker crafts a malicious program designed to trigger the double-free condition in the Windows Kernel.</li>
<li>The malicious program interacts with a vulnerable kernel function, likely through a specific system call (Nt*).</li>
<li>The vulnerable kernel function attempts to free the same memory region twice due to a logical error.</li>
<li>The double-free corrupts the kernel&rsquo;s memory management structures, such as the heap metadata.</li>
<li>The memory corruption allows the attacker to overwrite critical kernel data structures, such as process tokens or privilege attributes.</li>
<li>The attacker modifies the process token of their own process, elevating their privileges to SYSTEM or another highly privileged account.</li>
<li>The attacker now executes privileged commands and gains full control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26179 allows a local attacker to elevate privileges to SYSTEM, the highest level of privilege on a Windows system. This grants the attacker complete control over the compromised machine, allowing them to install software, modify data, create new accounts, and access sensitive information. A successful privilege escalation can lead to a complete compromise of the confidentiality, integrity, and availability of the system. This vulnerability affects all Windows systems where the patch has not been applied.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-26179 as soon as possible.</li>
<li>Monitor systems for unusual process creation events originating from user accounts, as this could be an indicator of exploit activity. Deploy the provided Sigma rule <code>Detect Suspicious Process Token Modifications</code> to identify potential privilege escalation attempts.</li>
<li>Enable process auditing and monitor for unusual system calls using tools like Sysmon to catch the initial exploitation attempts.</li>
<li>Regularly review and enforce the principle of least privilege to limit the impact of successful local exploits.</li>
<li>Deploy the Sigma rule <code>Detect Double Free Vulnerability Exploitation</code> to identify exploitation of double free vulnerabilities by monitoring process creation and memory allocation patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category><category>kernel</category><category>double-free</category></item><item><title>CVE-2026-31609 SMB Client Double-Free Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-smb-double-free/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-smb-double-free/</guid><description>CVE-2026-31609 is a critical double-free vulnerability in the SMB client, specifically within the smbd_free_send_io() function after smbd_send_batch_flush(), potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-31609 is a double-free vulnerability affecting the SMB (Server Message Block) client. The vulnerability resides in the <code>smbd_free_send_io()</code> function, which is called after <code>smbd_send_batch_flush()</code>. A double-free vulnerability occurs when memory is freed twice, potentially leading to corruption of the heap and potentially allowing an attacker to execute arbitrary code. The specifics of exploitation are not detailed in the initial advisory but successful exploitation could lead to a complete compromise of the affected system. This vulnerability demands immediate attention from security teams due to the potential for remote code execution and the widespread use of the SMB protocol in networked environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious SMB request designed to trigger the <code>smbd_send_batch_flush()</code> function within the SMB client.</li>
<li>The <code>smbd_send_batch_flush()</code> function executes, processing the crafted SMB request.</li>
<li>Due to a flaw in the logic, the same memory is passed twice to a <code>free()</code> call within <code>smbd_free_send_io()</code>.</li>
<li>The first <code>free()</code> call deallocates the memory as intended.</li>
<li>The second <code>free()</code> call attempts to deallocate the already freed memory, causing a double-free condition.</li>
<li>This double-free corrupts the heap metadata, creating an opportunity for an attacker to manipulate memory allocation.</li>
<li>The attacker exploits the heap corruption to overwrite critical data structures within the SMB client process.</li>
<li>By overwriting function pointers or other sensitive data, the attacker gains control of the execution flow, leading to arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31609 could allow an attacker to execute arbitrary code on the affected system with the privileges of the SMB client. Given the widespread use of SMB for file sharing and network communication, this vulnerability could be leveraged to gain unauthorized access to sensitive data, install malware, or disrupt critical services. The impact could range from data breaches and ransomware attacks to complete system compromise and lateral movement within a network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-31609 as soon as possible.</li>
<li>Enable SMB auditing to monitor for suspicious SMB traffic and potential exploitation attempts.</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts by monitoring for unusual SMB client process behavior.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>smb</category><category>double-free</category><category>cve-2026-31609</category><category>rce</category></item></channel></rss>