<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Heap-Buffer-Overflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/heap-buffer-overflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 09:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/heap-buffer-overflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>Binutils XCOFF Heap-Based Buffer Overflow Vulnerability (CVE-2026-6846)</title><link>https://feed.craftedsignal.io/briefs/2026-04-binutils-xcoff-heap-overflow/</link><pubDate>Wed, 22 Apr 2026 09:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-binutils-xcoff-heap-overflow/</guid><description>A heap-buffer-overflow vulnerability exists in binutils when processing a specially crafted XCOFF object file, potentially leading to arbitrary code execution or denial of service.</description><content:encoded><![CDATA[<p>CVE-2026-6846 describes a heap-based buffer overflow vulnerability found in the binutils suite of programs. The vulnerability occurs when processing a maliciously crafted XCOFF (Extended Common Object File Format) object file during the linking process. An attacker with local access could potentially exploit this flaw by enticing a user to process a malicious XCOFF file. Successful exploitation could lead to arbitrary code execution with the privileges of the user running binutils, unauthorized command execution, or a denial-of-service condition rendering the system unusable. This vulnerability affects systems where binutils is used for software development and linking, making it a significant concern for developers and system administrators.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious XCOFF object file designed to trigger the heap-based buffer overflow.</li>
<li>The attacker gains local access to a system where the victim uses binutils.</li>
<li>The attacker social engineers or tricks the victim into using binutils to link the malicious XCOFF file. This could involve including the malicious file in a build script or project.</li>
<li>When binutils attempts to process the specially crafted XCOFF file during linking, it allocates an insufficient buffer on the heap.</li>
<li>The parsing of the malicious XCOFF file causes the heap buffer to overflow, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data structures or function pointers in memory.</li>
<li>The overwritten data structures or function pointers are used by binutils later in the linking process, diverting execution flow.</li>
<li>The attacker gains arbitrary code execution with the privileges of the user running binutils or causes a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6846 can have severe consequences. An attacker can gain arbitrary code execution with the privileges of the user running binutils, potentially leading to complete system compromise. A denial-of-service condition can also be triggered, rendering the affected system unusable. This vulnerability primarily impacts developers and system administrators who rely on binutils for software development and linking tasks. While the source does not provide specific numbers of victims, the wide usage of binutils makes this a potentially widespread vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches released by your Linux distribution or other binutils vendor to address CVE-2026-6846.</li>
<li>Implement file integrity monitoring to detect unauthorized modifications to binutils binaries.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Binutils Invocation</code> to identify potential exploitation attempts based on command-line arguments.</li>
<li>Monitor process creation events for binutils executing with unusual or unexpected parent processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>binutils</category><category>heap-buffer-overflow</category><category>CVE-2026-6846</category><category>xcoff</category></item><item><title>ImageMagick Heap Buffer Overflow Vulnerability (CVE-2026-33901)</title><link>https://feed.craftedsignal.io/briefs/2026-04-imagemagick-heap-overflow/</link><pubDate>Mon, 13 Apr 2026 21:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-imagemagick-heap-overflow/</guid><description>ImageMagick versions before 7.1.2-19 and 6.9.13-44 are vulnerable to a heap buffer overflow in the MVG decoder, potentially leading to an out-of-bounds write when processing a crafted image, which can result in denial of service or arbitrary code execution.</description><content:encoded><![CDATA[<p>ImageMagick is a widely used open-source software suite for displaying, converting, and editing raster image files.  CVE-2026-33901 describes a heap buffer overflow vulnerability within the MVG (Magick Vector Graphics) decoder. This flaw exists in ImageMagick versions prior to 7.1.2-19 and 6.9.13-44. An attacker can exploit this vulnerability by crafting a malicious image file. When a vulnerable ImageMagick version processes this crafted image, the MVG decoder attempts to write data beyond the allocated buffer, resulting in an out-of-bounds write. This can lead to application crashes, denial-of-service conditions, or potentially arbitrary code execution on the targeted system.  Organizations utilizing ImageMagick for image processing are vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious image file containing a specially designed MVG (Magick Vector Graphics) payload.</li>
<li>The attacker delivers the crafted image file to a target system, potentially via a web upload form or email attachment.</li>
<li>A user or automated process on the target system uses a vulnerable version of ImageMagick to process the image file.</li>
<li>The ImageMagick MVG decoder attempts to parse the malicious MVG data within the image.</li>
<li>Due to the heap buffer overflow vulnerability (CVE-2026-33901), the decoder writes data beyond the allocated buffer on the heap.</li>
<li>This out-of-bounds write corrupts adjacent memory regions.</li>
<li>Depending on the overwritten memory, the application might crash, leading to a denial-of-service.</li>
<li>In some scenarios, this memory corruption could potentially be leveraged for arbitrary code execution, allowing the attacker to gain control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33901 can lead to denial of service due to application crashes. In more severe cases, the vulnerability could allow for arbitrary code execution, potentially leading to complete system compromise.  The impact will depend on the privileges of the user account running ImageMagick, but could lead to data loss, system instability, or unauthorized access. Organizations using affected versions of ImageMagick are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ImageMagick to version 7.1.2-19 or 6.9.13-44 or later to patch CVE-2026-33901.</li>
<li>Monitor web server logs for requests to process image files (e.g., via POST requests) to identify potential exploitation attempts.</li>
<li>Implement input validation to restrict the types and sizes of image files that can be uploaded or processed by ImageMagick.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>imagemagick</category><category>heap-buffer-overflow</category><category>cve-2026-33901</category></item><item><title>LibRaw Integer Overflow Vulnerability in deflate_dng_load_raw</title><link>https://feed.craftedsignal.io/briefs/2026-04-libraw-integer-overflow/</link><pubDate>Tue, 07 Apr 2026 15:17:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-libraw-integer-overflow/</guid><description>CVE-2026-20884 is an integer overflow vulnerability in LibRaw's deflate_dng_load_raw function that leads to a heap buffer overflow when processing crafted DNG files.</description><content:encoded><![CDATA[<p>CVE-2026-20884 describes an integer overflow vulnerability affecting LibRaw, specifically within the <code>deflate_dng_load_raw</code> function. This flaw resides in commit 8dc68e2 of the LibRaw library. The vulnerability can be exploited by providing a specially crafted DNG (Digital Negative) image file to an application using the affected LibRaw version. Successful exploitation results in a heap buffer overflow, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service condition. This is significant for defenders because LibRaw is a widely used library for handling raw image formats and is often integrated into image processing applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious DNG image file designed to trigger the integer overflow in <code>deflate_dng_load_raw</code>.</li>
<li>The victim opens the malicious DNG file using an application that utilizes the vulnerable LibRaw library.</li>
<li>LibRaw&rsquo;s <code>deflate_dng_load_raw</code> function is called to process the image data.</li>
<li>During the processing of the DNG file, an integer overflow occurs when calculating the size of a buffer.</li>
<li>The overflow results in allocating a smaller-than-expected buffer on the heap.</li>
<li>Subsequently, when decompressing the image data, the <code>deflate</code> algorithm writes beyond the allocated buffer, causing a heap buffer overflow.</li>
<li>The heap buffer overflow overwrites adjacent memory regions, potentially corrupting program data or code.</li>
<li>The attacker leverages the memory corruption to achieve arbitrary code execution or cause the application to crash.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20884 allows an attacker to potentially execute arbitrary code within the context of the application using the LibRaw library. This could lead to complete system compromise. Alternatively, the heap buffer overflow could cause the application to crash, resulting in a denial-of-service. The impact depends on the privileges of the application using LibRaw. Image processing software, photography workflows, and digital asset management systems are all potential targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a version of LibRaw that addresses CVE-2026-20884 to remediate the vulnerability.</li>
<li>Monitor for applications processing DNG files from untrusted sources (e.g., web downloads or email attachments).</li>
<li>Consider implementing file validation and sanitization techniques to detect and prevent malicious DNG files from being processed.</li>
<li>Deploy the Sigma rule &ldquo;Detect LibRaw Exploitation via DNG&rdquo; to identify potential exploitation attempts.</li>
<li>Enable process creation logging to detect applications loading LibRaw library when processing DNG files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libraw</category><category>integer-overflow</category><category>heap-buffer-overflow</category><category>cve-2026-20884</category></item><item><title>openFPGALoader Heap-Buffer-Overflow Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openfpgaloader-heap-overflow/</link><pubDate>Mon, 06 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openfpgaloader-heap-overflow/</guid><description>A heap-buffer-overflow read vulnerability exists in openFPGALoader 1.1.1 and earlier, allowing out-of-bounds heap memory access via a crafted .pof file, potentially leading to denial of service or information disclosure.</description><content:encoded><![CDATA[<p>openFPGALoader is a utility used for programming Field-Programmable Gate Arrays (FPGAs). A heap-buffer-overflow read vulnerability has been identified in versions 1.1.1 and earlier. The vulnerability, tracked as CVE-2026-35176, resides in the <code>POFParser::parseSection()</code> function. It allows an attacker to trigger out-of-bounds heap memory access by supplying a specially crafted <code>.pof</code> file. Critically, exploiting this vulnerability does not require any specific FPGA hardware, making it easier to trigger. Successful exploitation could lead to denial of service or information disclosure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious <code>.pof</code> file designed to trigger the heap-buffer-overflow.</li>
<li>The attacker delivers the malicious <code>.pof</code> file to a system running a vulnerable version of openFPGALoader (&lt;= 1.1.1).</li>
<li>A user or automated process attempts to parse the malicious <code>.pof</code> file using openFPGALoader.</li>
<li>The <code>POFParser::parseSection()</code> function is called to process a section of the <code>.pof</code> file.</li>
<li>Due to the crafted structure of the <code>.pof</code> file, the <code>parseSection()</code> function attempts to read beyond the allocated heap buffer.</li>
<li>This out-of-bounds read operation causes the program to potentially crash (denial of service) or leak sensitive information from adjacent memory locations.</li>
<li>If information disclosure occurs, the attacker may gain insights into the system&rsquo;s memory layout or potentially extract sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial-of-service condition, causing the openFPGALoader application to crash. In certain scenarios, it might also be possible to read sensitive information from the application&rsquo;s memory space. While the exact scope of information disclosure is dependent on memory layout, the vulnerability poses a risk to systems using vulnerable versions of openFPGALoader. The risk is primarily to development environments using this tool rather than production FPGA deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade openFPGALoader to a version greater than 1.1.1 to patch CVE-2026-35176.</li>
<li>Deploy the Sigma rule &ldquo;Detect openFPGALoader POF Parsing with Unusual Process Arguments&rdquo; to your SIEM to identify potential exploitation attempts involving the execution of openFPGALoader with <code>.pof</code> files.</li>
<li>Monitor file system events for the creation or modification of <code>.pof</code> files in unusual locations to detect potential attempts to introduce malicious files into the system.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>heap-buffer-overflow</category><category>openFPGALoader</category><category>denial-of-service</category><category>information-disclosure</category></item><item><title>FreeRDP Heap-Buffer-Overflow Vulnerability (CVE-2026-33982)</title><link>https://feed.craftedsignal.io/briefs/2026-03-freerdp-heap-overflow/</link><pubDate>Mon, 30 Mar 2026 22:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-freerdp-heap-overflow/</guid><description>A heap-buffer-overflow read vulnerability exists in FreeRDP versions prior to 3.24.2, specifically in the winpr_aligned_offset_recalloc() function, potentially leading to denial of service or information disclosure.</description><content:encoded>&lt;p>CVE-2026-33982 is a heap-buffer-overflow READ vulnerability affecting FreeRDP, a widely used open-source implementation of the Remote Desktop Protocol (RDP). The vulnerability exists in versions prior to 3.24.2 and is located within the &lt;code>winpr_aligned_offset_recalloc()&lt;/code> function. Specifically, the flaw occurs due to an out-of-bounds read 24 bytes before the allocated buffer, which could be triggered during specific RDP operations involving memory reallocation. Successful exploitation can lead…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>freerdp</category><category>heap-buffer-overflow</category><category>cve-2026-33982</category><category>rdp</category></item><item><title>CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-webgl-heap-overflow/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-webgl-heap-overflow/</guid><description>A heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-4675 describes a heap buffer overflow vulnerability affecting the WebGL component of Google Chrome. Specifically, versions prior to 146.0.7680.165 are susceptible. An attacker can exploit this vulnerability by crafting a malicious HTML page that, when rendered by a vulnerable Chrome browser, triggers an out-of-bounds memory read due to the heap buffer overflow in WebGL. The Chromium security team rated this as a &ldquo;High&rdquo; severity issue. Successful exploitation can lead to information…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4675</category><category>heap-buffer-overflow</category><category>webgl</category><category>chrome</category><category>remote-code-execution</category></item></channel></rss>