<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Heap-Overflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/heap-overflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/heap-overflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>BusyBox DHCPv6 Client Heap Buffer Overflow Vulnerability (CVE-2026-29004)</title><link>https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</link><pubDate>Mon, 04 May 2026 18:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</guid><description>A heap buffer overflow vulnerability in BusyBox's DHCPv6 client allows network-adjacent attackers to trigger memory corruption, denial of service, or arbitrary code execution via crafted DHCPv6 responses.</description><content:encoded><![CDATA[<p>CVE-2026-29004 is a critical heap buffer overflow vulnerability affecting BusyBox before commit 42202bf. The vulnerability resides in the DHCPv6 client (udhcpc6), specifically within the DNS_SERVERS option handler located in networking/udhcp/d6_dhcpc.c. A network-adjacent attacker can exploit this flaw by sending a malicious DHCPv6 response containing a malformed D6_OPT_DNS_SERVERS option. This manipulation leads to incorrect heap buffer allocation calculations in the option_to_env() function, causing memory corruption. Successful exploitation can result in a denial of service or, more severely, arbitrary code execution on vulnerable embedded systems lacking heap hardening. The scope of impact is potentially broad, given BusyBox&rsquo;s widespread use in embedded devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target embedded system running a vulnerable version of BusyBox with the DHCPv6 client enabled.</li>
<li>The attacker crafts a malicious DHCPv6 response packet.</li>
<li>The crafted packet includes a D6_OPT_DNS_SERVERS option with a size that exceeds the expected buffer allocation.</li>
<li>The attacker transmits the crafted DHCPv6 response packet to the target system on the local network.</li>
<li>The target system&rsquo;s udhcpc6 client receives the malicious DHCPv6 response.</li>
<li>The udhcpc6 client processes the D6_OPT_DNS_SERVERS option, triggering the vulnerable option_to_env() function.</li>
<li>The option_to_env() function calculates an insufficient buffer size based on the malformed option.</li>
<li>A heap buffer overflow occurs when copying the oversized DNS server list, leading to memory corruption, denial-of-service, or arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29004 can have severe consequences. A denial-of-service condition could disrupt the functionality of the affected embedded system. More critically, arbitrary code execution allows attackers to gain complete control over the device, potentially leading to data theft, device compromise, or use in botnet activities. Given BusyBox&rsquo;s prevalence in embedded systems, a large number of devices are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch addressing CVE-2026-29004 by updating to a version of BusyBox after commit 42202bf.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious DHCPv6 DNS Server Option Size&rdquo; to identify potentially malicious DHCPv6 responses in network traffic.</li>
<li>Monitor network traffic for unusually large DHCPv6 DNS_SERVERS options as indicated by the Sigma rule and network connection logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap-overflow</category><category>dhcpv6</category><category>busybox</category><category>cve-2026-29004</category><category>denial-of-service</category></item><item><title>CVE-2026-7339: Heap Buffer Overflow in WebRTC</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</guid><description>A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7339 is a critical heap buffer overflow vulnerability affecting the WebRTC (Web Real-Time Communication) component in Google Chrome and Microsoft Edge (Chromium-based). This vulnerability stems from improper memory management within WebRTC, potentially allowing a remote attacker to execute arbitrary code by crafting malicious web content. As Microsoft Edge ingests Chromium, it is also vulnerable. Users of Chrome and Edge are affected. Defenders should apply available patches promptly to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious website designed to trigger the WebRTC vulnerability.</li>
<li>The victim visits the malicious website using a vulnerable version of Chrome or Edge.</li>
<li>The website uses JavaScript to initiate a WebRTC session.</li>
<li>The crafted WebRTC data triggers a heap buffer overflow during memory allocation within the WebRTC component.</li>
<li>The overflow overwrites adjacent memory regions on the heap.</li>
<li>The attacker carefully crafts the overflow data to overwrite critical program data or function pointers.</li>
<li>The corrupted data leads to arbitrary code execution within the context of the browser process.</li>
<li>The attacker gains control of the user&rsquo;s browser and potentially the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7339 can lead to arbitrary code execution, allowing an attacker to potentially install malware, steal sensitive information, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability could impact a large number of users across various sectors, including individuals, businesses, and government organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge (Chromium-based) to patch CVE-2026-7339.</li>
<li>Deploy the Sigma rule &ldquo;Detect WebRTC Heap Overflow Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-7339.</li>
<li>Monitor web server logs for unusual requests or patterns associated with WebRTC usage that could indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>webrtc</category><category>heap-overflow</category><category>code-execution</category><category>cve-2026-7339</category></item><item><title>Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</guid><description>CVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7353 is a critical heap buffer overflow vulnerability residing within the Skia graphics library, a core component of the Chromium open-source project. This vulnerability impacts applications that utilize Chromium, including Google Chrome and Microsoft Edge. While the specific details of exploitation are not provided in this brief, the nature of a heap buffer overflow suggests a high potential for arbitrary code execution. Successful exploitation could allow an attacker to gain control of the affected browser process. Given the widespread use of Chromium-based browsers, this vulnerability poses a significant risk to a large user base. Defenders should prioritize patching and consider implementing mitigations to detect and prevent potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page or injects malicious content into a trusted website.</li>
<li>The victim visits the malicious web page or interacts with the injected content using a Chromium-based browser (Chrome or Edge).</li>
<li>The browser&rsquo;s rendering engine, utilizing the Skia library, processes the malicious content, triggering the heap buffer overflow in Skia.</li>
<li>The overflow allows the attacker to overwrite adjacent memory regions in the heap.</li>
<li>By carefully crafting the overflowed data, the attacker can overwrite critical data structures within the browser process.</li>
<li>The attacker gains control of the execution flow by overwriting function pointers or other control data.</li>
<li>The attacker executes arbitrary code within the context of the browser process.</li>
<li>The attacker could then perform actions such as installing malware, stealing sensitive data, or further compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7353 allows for arbitrary code execution within the context of the affected browser process. This can lead to a complete compromise of the user&rsquo;s browser session, potentially enabling the attacker to steal credentials, inject malicious code into other websites, or install malware on the victim&rsquo;s system. Given the widespread use of Chrome and Edge, the potential impact is significant, affecting potentially millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7353.</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts based on suspicious process execution originating from the browser (see &ldquo;Detect Suspicious Process Creation from Browser&rdquo;).</li>
<li>Enable enhanced browser security features such as site isolation to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap overflow</category><category>chromium</category><category>cve-2026-7353</category></item><item><title>NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ntfs3g-heap-overflow/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ntfs3g-heap-overflow/</guid><description>A heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.</description><content:encoded><![CDATA[<p>CVE-2026-40706 describes a heap buffer overflow vulnerability affecting NTFS-3G, specifically versions 2022.10.3 and earlier, before the patch in version 2026.2.25. The vulnerability lies within the <code>ntfs_build_permissions_posix()</code> function in <code>acls.c</code>. An attacker can exploit this flaw by creating a malicious NTFS image. When the affected software attempts to read this specially crafted image, a heap buffer overflow occurs. This is triggered when the software processes a security descriptor containing multiple ACCESS_DENIED Access Control Entries (ACEs), each including WRITE_OWNER permissions, and originating from distinct group Security Identifiers (SIDs). Successful exploitation allows an attacker to corrupt heap memory within the SUID-root ntfs-3g binary, potentially leading to privilege escalation or arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious NTFS image containing a specially designed security descriptor.</li>
<li>The security descriptor includes multiple ACCESS_DENIED ACEs.</li>
<li>Each ACE within the descriptor contains WRITE_OWNER permissions.</li>
<li>The ACEs originate from distinct group SIDs, triggering the overflow condition.</li>
<li>The attacker delivers the malicious NTFS image to a system running a vulnerable version of NTFS-3G. This may occur through physical media or network shares.</li>
<li>The victim system attempts to read the malicious NTFS image using a vulnerable NTFS-3G version, such as during a <code>stat</code>, <code>readdir</code>, or <code>open</code> operation.</li>
<li>The <code>ntfs_build_permissions_posix()</code> function is called to process the security descriptor.</li>
<li>The heap buffer overflow occurs during the processing of the malicious ACEs, corrupting heap memory. This can lead to denial of service or potentially arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40706 allows for heap memory corruption in the ntfs-3g binary, which runs with elevated privileges due to its SUID-root configuration. The observed consequence is memory corruption. Depending on the extent of the corruption, this could lead to denial-of-service or arbitrary code execution. Given the wide usage of NTFS-3G for mounting NTFS volumes on Linux and other systems, a successful exploit could affect a large number of systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NTFS-3G to version 2026.2.25 or later to patch CVE-2026-40706 (reference: <a href="https://github.com/tuxera/ntfs-3g/releases/tag/2026.2.25">https://github.com/tuxera/ntfs-3g/releases/tag/2026.2.25</a>).</li>
<li>Monitor systems for unexpected crashes or errors related to ntfs-3g operations, which may indicate exploitation attempts. Deploy the Sigma rules below to your SIEM and tune for your environment.</li>
<li>Consider implementing stricter access controls and validation measures on NTFS images to prevent the use of malicious images (mitigation based on the vulnerability description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ntfs-3g</category><category>heap-overflow</category><category>privilege-escalation</category><category>linux</category></item><item><title>Creolabs Gravity Heap Buffer Overflow Vulnerability (CVE-2026-40504)</title><link>https://feed.craftedsignal.io/briefs/2026-04-creolabs-gravity-heap-overflow/</link><pubDate>Thu, 16 Apr 2026 02:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-creolabs-gravity-heap-overflow/</guid><description>Creolabs Gravity before 0.9.6 is vulnerable to a heap buffer overflow in the gravity_vm_exec function, allowing attackers to achieve arbitrary code execution by crafting scripts with many string literals at global scope that exploit insufficient bounds checking in gravity_fiber_reassign().</description><content:encoded><![CDATA[<p>Creolabs Gravity, a scripting language, is susceptible to a heap buffer overflow vulnerability (CVE-2026-40504) affecting versions prior to 0.9.6. The vulnerability resides within the <code>gravity_vm_exec</code> function and can be triggered by crafting Gravity scripts containing a large number of string literals declared at the global scope. This leads to an out-of-bounds write, potentially corrupting heap metadata. Successful exploitation of this vulnerability can lead to arbitrary code execution within applications that evaluate untrusted Gravity scripts. The root cause is insufficient bounds checking in the <code>gravity_fiber_reassign()</code> function. Defenders need to ensure they are running version 0.9.6 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Gravity script with numerous string literals defined at the global scope.</li>
<li>The application using the vulnerable Creolabs Gravity library loads and attempts to execute the crafted script, calling the <code>gravity_vm_exec</code> function.</li>
<li>During script execution, the <code>gravity_vm_exec</code> function allocates memory on the heap to store the string literals.</li>
<li>The sheer number of string literals causes a heap buffer overflow when <code>gravity_fiber_reassign()</code> is called.</li>
<li>The heap buffer overflow corrupts adjacent heap metadata.</li>
<li>The corruption of heap metadata leads to unpredictable behavior, potentially including crashes or the ability to overwrite critical data structures.</li>
<li>The attacker leverages the ability to overwrite heap metadata to gain control of program execution flow.</li>
<li>The attacker achieves arbitrary code execution within the context of the application running the vulnerable Gravity script.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40504 can lead to arbitrary code execution, potentially allowing attackers to gain full control over systems running applications that execute untrusted Gravity scripts. Given a CVSS v3.1 base score of 9.8, this is a critical vulnerability. The exact number of victims or targeted sectors is unknown, but any application using a vulnerable version of Creolabs Gravity to execute untrusted code is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Creolabs Gravity to version 0.9.6 or later to patch CVE-2026-40504 (Reference: <a href="https://github.com/marcobambini/gravity/releases/tag/0.9.6)">https://github.com/marcobambini/gravity/releases/tag/0.9.6)</a>.</li>
<li>Implement input validation and sanitization of Gravity scripts to limit the number and size of string literals processed to prevent triggering the heap overflow.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts by monitoring process creation events that may indicate arbitrary code execution following the heap overflow.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>heap-overflow</category><category>code-execution</category></item><item><title>Adobe InDesign Heap-Based Buffer Overflow Vulnerability (CVE-2026-34629)</title><link>https://feed.craftedsignal.io/briefs/2026-04-indesign-heap-overflow/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-indesign-heap-overflow/</guid><description>Adobe InDesign versions 20.5.2, 21.2 and earlier are vulnerable to a heap-based buffer overflow (CVE-2026-34629) that could lead to arbitrary code execution if a user opens a malicious file.</description><content:encoded><![CDATA[<p>Adobe InDesign Desktop versions 20.5.2, 21.2, and earlier are susceptible to a heap-based buffer overflow vulnerability identified as CVE-2026-34629. This vulnerability allows for arbitrary code execution within the security context of the currently logged-in user. To exploit this vulnerability, a user must interact with a specially crafted malicious file. Successful exploitation could allow an attacker to gain control of the affected system, potentially leading to data theft, malware installation, or other malicious activities. Defenders should prioritize patching vulnerable InDesign installations and educating users about the risks of opening untrusted files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious InDesign file designed to trigger a heap-based buffer overflow.</li>
<li>The attacker distributes the malicious file to a target, possibly via email or other file-sharing methods.</li>
<li>The victim opens the malicious InDesign file using a vulnerable version of Adobe InDesign (20.5.2, 21.2, or earlier).</li>
<li>The application attempts to process the malformed data within the file.</li>
<li>Due to the buffer overflow, the application writes data beyond the allocated buffer on the heap.</li>
<li>This overwrites adjacent memory regions, potentially corrupting critical data or function pointers.</li>
<li>The attacker gains control of the instruction pointer and redirects execution flow to attacker-controlled code.</li>
<li>The attacker executes arbitrary code within the context of the InDesign process, achieving code execution on the victim&rsquo;s machine.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34629 allows an attacker to execute arbitrary code on a vulnerable system with the privileges of the logged-in user. This could lead to complete system compromise, data theft, installation of malware, or other malicious activities. The impact is significant due to the widespread use of Adobe InDesign in professional design and publishing environments. If a successful attack occurs within a corporate environment it could compromise sensitive business documents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Adobe InDesign to the latest version to remediate CVE-2026-34629.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Educate users about the dangers of opening untrusted files, especially those received from unknown sources, to mitigate the initial attack vector.</li>
<li>Monitor process creation events for suspicious processes spawned by InDesign, as indicated in the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-34629</category><category>heap-overflow</category><category>adobe-indesign</category></item><item><title>CVE-2026-32087 Function Discovery Service Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-fdwsd-privesc/</link><pubDate>Tue, 14 Apr 2026 18:17:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fdwsd-privesc/</guid><description>CVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.</description><content:encoded><![CDATA[<p>CVE-2026-32087 describes a heap-based buffer overflow vulnerability affecting the Function Discovery Service, specifically the <code>fdwsd.dll</code> module. This vulnerability allows a locally authenticated attacker with low privileges to escalate their privileges to a higher level on the targeted Windows system. The vulnerability exists within the handling of specific data structures or function calls within <code>fdwsd.dll</code>, leading to memory corruption when processing malformed input. Successful exploitation could allow an attacker to execute arbitrary code with elevated privileges, potentially leading to complete system compromise. The scope of the vulnerability is limited to local exploitation, requiring prior access to the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Windows system with low-privileged credentials.</li>
<li>The attacker crafts a malicious input designed to trigger the heap-based buffer overflow within <code>fdwsd.dll</code>.</li>
<li>The attacker interacts with the Function Discovery Service, providing the crafted malicious input, potentially through a specially crafted application or API call.</li>
<li>The Function Discovery Service attempts to process the attacker-supplied input via <code>fdwsd.dll</code>.</li>
<li>During the processing, the heap-based buffer overflow occurs due to insufficient bounds checking, overwriting adjacent memory regions on the heap.</li>
<li>The attacker leverages the memory corruption to overwrite critical system data structures or inject malicious code into memory.</li>
<li>The injected code or modified data structures are then executed by the Function Discovery Service, running with elevated privileges.</li>
<li>The attacker successfully escalates their privileges and gains control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32087 leads to local privilege escalation, granting the attacker elevated privileges on the compromised system. This allows the attacker to perform actions restricted to administrators or system-level accounts, such as installing software, modifying system configurations, accessing sensitive data, or creating new accounts with elevated privileges. The impact is limited to the local system, but a successful privilege escalation is a critical step for attackers aiming to achieve lateral movement or persistence within a network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-32087, as detailed in the Microsoft Security Response Center advisory <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32087">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32087</a>.</li>
<li>Monitor for suspicious process creations originating from the Function Discovery Service (fdwsd.dll) using process creation logs and deploy the Sigma rule <code>Detect Suspicious Process Creation from FDWSD</code> to identify potential exploitation attempts.</li>
<li>Implement strict access control policies to limit local access to systems and reduce the attack surface for this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>heap-overflow</category><category>cve</category><category>windows</category></item><item><title>Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-heap-overflow/</link><pubDate>Tue, 14 Apr 2026 16:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-heap-overflow/</guid><description>CVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.</description><content:encoded><![CDATA[<p>A heap-based buffer overflow vulnerability, identified as CVE-2026-22828, affects Fortinet FortiAnalyzer Cloud and FortiManager Cloud versions 7.6.2 through 7.6.4. The vulnerability allows a remote, unauthenticated attacker to potentially execute arbitrary code or commands. Exploitation necessitates sending specifically crafted requests to the affected systems. The complexity of a successful exploit is amplified by the presence of Address Space Layout Randomization (ASLR) and network segmentation, which impose significant hurdles for attackers in preparing the environment for code execution. This vulnerability poses a risk to organizations utilizing these Fortinet cloud services, potentially allowing for unauthorized access and control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiAnalyzer or FortiManager Cloud instance running versions 7.6.2-7.6.4.</li>
<li>The attacker crafts a malicious HTTP request designed to trigger the heap-based buffer overflow. This involves analyzing the vulnerable application to identify the specific request parameters and data structures that can be manipulated.</li>
<li>The attacker sends the crafted request to the targeted Fortinet Cloud instance.</li>
<li>Due to the buffer overflow, the crafted request overwrites adjacent memory on the heap, potentially corrupting data structures used by the application.</li>
<li>The attacker attempts to leverage the memory corruption to gain control of program execution. Because of ASLR, this step requires careful planning and potentially multiple attempts to bypass address randomization.</li>
<li>Upon successful bypass of ASLR, the attacker overwrites a function pointer or other critical data in memory to redirect program control to attacker-controlled code.</li>
<li>The attacker executes arbitrary code within the context of the FortiAnalyzer or FortiManager Cloud process.</li>
<li>The attacker can now execute commands, potentially gaining unauthorized access to sensitive data, modifying system configurations, or deploying further malicious payloads within the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22828 can allow a remote, unauthenticated attacker to execute arbitrary code on vulnerable Fortinet FortiAnalyzer Cloud and FortiManager Cloud instances (versions 7.6.2 through 7.6.4). While the effort required is considerable, a successful attack can lead to a complete compromise of the affected system, potentially resulting in data breaches, service disruption, or the deployment of malicious software. The absence of specific victim counts or sector targeting details in the original advisory emphasizes the importance of proactive mitigation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a fixed version of Fortinet FortiAnalyzer Cloud and FortiManager Cloud to address CVE-2026-22828 (<a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-121)">https://fortiguard.fortinet.com/psirt/FG-IR-26-121)</a>.</li>
<li>Implement network segmentation to limit the potential impact of a successful exploit, as mentioned in the vulnerability description.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious HTTP Requests to Fortinet Cloud Services&rdquo; to identify potential exploitation attempts (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-22828</category><category>fortinet</category><category>heap-overflow</category><category>cloud</category></item><item><title>OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openexr-dwa-oob-write/</link><pubDate>Thu, 09 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openexr-dwa-oob-write/</guid><description>A heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.</description><content:encoded><![CDATA[<p>A heap out-of-bounds write vulnerability has been identified in the DWA lossy decoder of OpenEXR versions 3.2.0-3.2.6, 3.3.0-3.3.8, and 3.4.0-3.4.8. The vulnerability stems from an integer overflow in the calculation of per-component block pointers within the <code>internal_dwa_decoder.h</code> file. When processing a DWAA compressed image with a large width, the multiplication of <code>numBlocksX * 64</code> overflows a signed 32-bit integer, resulting in a wrapped pointer. This wrapped pointer is then used in subsequent decoder operations, leading to out-of-bounds memory access during the lossy DCT execution path. This can be triggered using the <code>exrcheck</code> tool, impacting systems where OpenEXR is used to process image files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious OpenEXR image file with DWAA compression and a large image width.</li>
<li>The victim uses the <code>exrcheck</code> tool or an application linked against a vulnerable OpenEXR library to process the image.</li>
<li>The <code>InputFile</code> or <code>ScanLineInputFile</code> class initiates the image decoding process.</li>
<li>The <code>exr_decoding_run</code> function is called, which in turn calls <code>exr_uncompress_chunk</code>.</li>
<li><code>exr_uncompress_chunk</code> calls <code>internal_exr_undo_dwaa</code> to decompress the DWAA data.</li>
<li><code>internal_exr_undo_dwaa</code> invokes <code>DwaCompressor_uncompress</code>.</li>
<li>Inside <code>DwaCompressor_uncompress</code>, <code>LossyDctDecoder_execute</code> is called, triggering the integer overflow when calculating <code>rowBlock</code> pointers in <code>internal_dwa_decoder.h</code>.</li>
<li><code>LossyDctDecoder_execute</code> attempts to write data to an out-of-bounds memory location, resulting in a crash (SEGV).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition due to a write-side crash, as observed in the <code>LossyDctDecoder_execute</code> function. The vulnerability affects applications that utilize the OpenEXR library to process DWAA compressed images. While the source doesn&rsquo;t specify the number of victims or targeted sectors, any system processing untrusted OpenEXR images with affected versions is at risk. This could impact image editing software, rendering pipelines, and other applications that rely on OpenEXR.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenEXR to versions 3.2.7, 3.3.9, or 3.4.9 or later to patch CVE-2026-34589.</li>
<li>Deploy the Sigma rule &ldquo;Detect exrcheck crash&rdquo; to identify instances where the <code>exrcheck</code> tool crashes due to this vulnerability.</li>
<li>Monitor systems for abnormal program termination signals (e.g., SEGV) originating from OpenEXR libraries during image processing, as these may indicate exploitation attempts.</li>
<li>Block downloads from the URL <code>https://github.com/user-attachments/files/26318786/dwa_scanline_exrcheck.zip</code> to prevent users from downloading a known malicious test case.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openexr</category><category>heap-overflow</category><category>dwaa</category><category>cve-2026-34589</category></item><item><title>LibRaw Heap-Based Buffer Overflow Vulnerability (CVE-2026-24660)</title><link>https://feed.craftedsignal.io/briefs/2026-04-libraw-heap-overflow/</link><pubDate>Tue, 07 Apr 2026 15:17:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-libraw-heap-overflow/</guid><description>A heap-based buffer overflow vulnerability (CVE-2026-24660) exists in the x3f_load_huffman functionality of LibRaw commit d20315b, where a specially crafted malicious file can lead to a heap buffer overflow.</description><content:encoded><![CDATA[<p>A heap-based buffer overflow vulnerability, identified as CVE-2026-24660, has been discovered in LibRaw, specifically affecting the x3f_load_huffman functionality in commit d20315b. The vulnerability arises from improper handling of a crafted input file, leading to a heap buffer overflow condition. An attacker can exploit this vulnerability by providing a malicious file designed to trigger the overflow during the Huffman decoding process. This could potentially allow an attacker to execute arbitrary code or cause a denial-of-service condition. This vulnerability impacts applications that utilize LibRaw for processing image files, particularly those dealing with potentially untrusted or externally sourced image data. Defenders should be aware of this vulnerability and take steps to mitigate the risk by updating to patched versions of LibRaw or implementing input validation measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious image file in a format processed by LibRaw. This file is specifically designed to exploit the <code>x3f_load_huffman</code> function.</li>
<li>The vulnerable application using LibRaw processes the malicious image file.</li>
<li>During the Huffman decoding process within <code>x3f_load_huffman</code>, the crafted file triggers an integer overflow, leading to a heap buffer overflow.</li>
<li>Data is written beyond the allocated buffer on the heap.</li>
<li>This overwrite can corrupt adjacent heap metadata, potentially leading to control over memory allocation.</li>
<li>The attacker gains the ability to overwrite function pointers or other critical data structures on the heap.</li>
<li>By manipulating these structures, the attacker can redirect program execution flow.</li>
<li>The attacker achieves arbitrary code execution within the context of the application using LibRaw.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24660 can lead to arbitrary code execution, potentially allowing an attacker to gain full control over the affected system. The vulnerability resides in a widely used library, potentially impacting a large number of applications that depend on LibRaw for image processing. Exploitation could result in data breaches, system compromise, or denial-of-service conditions. Given the CVSS v3.1 base score of 8.1, this vulnerability poses a significant risk and requires prompt attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or updates to LibRaw to versions containing the fix for CVE-2026-24660 to remediate the vulnerability.</li>
<li>Implement input validation and sanitization measures for image files processed by LibRaw to detect and prevent malicious files from triggering the buffer overflow.</li>
<li>Monitor applications using LibRaw for unexpected crashes or abnormal behavior that could indicate exploitation attempts.</li>
<li>Deploy the Sigma rule &ldquo;Detect LibRaw Heap Overflow Attempt&rdquo; to detect exploitation attempts by monitoring process creation events.</li>
<li>Consider implementing Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to further mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libraw</category><category>heap-overflow</category><category>cve-2026-24660</category></item><item><title>Qualcomm IOCTL Memory Corruption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-ioctl-memcpy-corruption/</link><pubDate>Mon, 06 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ioctl-memcpy-corruption/</guid><description>A memory corruption vulnerability (CVE-2026-21372) exists when processing IOCTL requests with invalid buffer sizes leading to a heap-based buffer overflow, reported by Qualcomm with a CVSS v3.1 score of 7.8.</description><content:encoded><![CDATA[<p>CVE-2026-21372 describes a memory corruption vulnerability affecting systems that handle IOCTL requests, specifically during memcpy operations. The vulnerability arises when the system does not properly validate buffer sizes, leading to a heap-based buffer overflow (CWE-122). This flaw can be triggered by sending IOCTL requests with invalid buffer sizes, potentially allowing an attacker with local access to execute arbitrary code or cause a denial-of-service condition. Qualcomm reported this vulnerability in their April 2026 security bulletin. Successful exploitation requires the attacker to have the ability to send specifically crafted IOCTL requests to the vulnerable driver or service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to the system.</li>
<li>Attacker identifies the vulnerable driver or service that processes IOCTL requests.</li>
<li>Attacker crafts a malicious IOCTL request with an invalid buffer size, specifically designed to trigger a buffer overflow during a memcpy operation.</li>
<li>Attacker sends the crafted IOCTL request to the vulnerable driver or service.</li>
<li>The driver or service attempts to copy data into a buffer using memcpy, without properly validating the size of the input buffer.</li>
<li>Due to the invalid buffer size, the memcpy operation writes beyond the allocated buffer, causing a heap-based buffer overflow.</li>
<li>The heap overflow corrupts adjacent memory regions, potentially overwriting critical data structures or code.</li>
<li>The memory corruption leads to a denial-of-service condition or allows the attacker to execute arbitrary code with the privileges of the vulnerable driver or service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-21372 allows a local attacker to cause memory corruption, potentially leading to arbitrary code execution or a denial-of-service condition. This could allow attackers to gain elevated privileges or disrupt the normal operation of the affected system. The impact is significant due to the potential for complete system compromise if code execution is achieved.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate systems which utilize Qualcomm components for vulnerable IOCTL handlers and memcpy operations.</li>
<li>Monitor process execution for anomalous memory access patterns associated with drivers that handle IOCTL requests.</li>
<li>Apply patches or updates provided by Qualcomm to address CVE-2026-21372 as detailed in the Qualcomm security bulletin (<a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html)">https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html)</a>.</li>
<li>Implement robust input validation for IOCTL requests to prevent buffer overflows, focusing on buffer size checks before memcpy operations.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts by monitoring for processes interacting with device drivers and triggering a memcpy near the IOCTL call.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve-2026-21372</category><category>memory-corruption</category><category>heap-overflow</category><category>ioctl</category></item><item><title>Hirschmann HiLCOS Web Interface Heap Overflow Vulnerability (CVE-2024-14033)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hilcos-heap-overflow/</link><pubDate>Thu, 02 Apr 2026 21:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hilcos-heap-overflow/</guid><description>A heap overflow vulnerability in the HiLCOS web interface of Hirschmann Industrial IT products (CVE-2024-14033) allows unauthenticated remote attackers to cause a denial-of-service condition by sending specially crafted requests, leading to device crashes and service disruption, particularly when the Public Spot functionality is enabled.</description><content:encoded><![CDATA[<p>Hirschmann Industrial IT products are susceptible to a heap overflow vulnerability identified as CVE-2024-14033 within the HiLCOS web interface. This vulnerability enables unauthenticated remote attackers to trigger a denial-of-service condition by sending specific, crafted requests to the affected web interface. Successful exploitation of this vulnerability results in the crashing of the targeted device, causing service disruption. The risk is heightened in configurations where the Public Spot functionality is activated. This poses a significant threat to industrial networks relying on these devices for critical operations, potentially leading to downtime and operational impacts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable Hirschmann Industrial IT device with the HiLCOS web interface exposed.</li>
<li>The attacker crafts a malicious HTTP request specifically designed to trigger the heap overflow vulnerability in the HiLCOS web interface.</li>
<li>The attacker sends the specially crafted HTTP request to the targeted device&rsquo;s web interface (typically over port 80 or 443).</li>
<li>The HiLCOS web interface processes the malicious request without proper bounds checking, leading to a heap overflow.</li>
<li>The heap overflow corrupts memory within the device&rsquo;s system processes, causing instability.</li>
<li>The device&rsquo;s web server or other critical processes crash as a result of the memory corruption.</li>
<li>The device enters a denial-of-service state, becoming unresponsive to legitimate network traffic.</li>
<li>Network services provided by the affected device are disrupted, impacting dependent systems and users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-14033 results in a denial-of-service condition on affected Hirschmann Industrial IT devices. This can lead to significant disruption of network services, particularly in industrial control systems (ICS) environments. The impact includes loss of network connectivity, control system downtime, and potential cascading failures in dependent systems. The number of affected devices and sectors depends on the prevalence of vulnerable Hirschmann products within critical infrastructure and industrial networks, however any exploitation of this vulnerability would have a detrimental effect.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Hirschmann to remediate CVE-2024-14033, as referenced in the Belden Security Bulletin BSECV-2024-16.</li>
<li>Implement network segmentation and access control policies to limit exposure of the HiLCOS web interface to untrusted networks.</li>
<li>Monitor web server logs for suspicious HTTP requests indicative of exploitation attempts targeting CVE-2024-14033. Use the rule titled &ldquo;Detect Suspicious HiLCOS Web Requests&rdquo; as a starting point.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2024-14033</category><category>denial-of-service</category><category>heap-overflow</category><category>hilcos</category></item><item><title>Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-heap-overflow/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-heap-overflow/</guid><description>A remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.</description><content:encoded>&lt;p>CVE-2026-4673 is a heap buffer overflow vulnerability affecting the WebAudio component of Google Chrome. The vulnerability exists in versions prior to 146.0.7680.165. A remote attacker could exploit this vulnerability by crafting a malicious HTML page designed to trigger an out-of-bounds memory write. The Chromium security team has rated this vulnerability as High severity. Successful exploitation could allow an attacker to potentially execute arbitrary code within the context of the Chrome…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4673</category><category>chrome</category><category>webaudio</category><category>heap overflow</category><category>code execution</category></item><item><title>QEMU Hypervisor Escape via virtio-snd 0-Day</title><link>https://feed.craftedsignal.io/briefs/2026-03-qemu-escape/</link><pubDate>Thu, 19 Mar 2026 05:19:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-qemu-escape/</guid><description>An unpatched vulnerability in QEMU's virtio-snd component allows for a hypervisor escape due to an uncontrolled heap overflow.</description><content:encoded><![CDATA[<p>A recently disclosed vulnerability in the QEMU virtualization platform allows a malicious guest operating system to escape the hypervisor and potentially execute code on the host system. The vulnerability resides in the <code>virtio-snd</code> component, which emulates a sound card for virtual machines. The root cause is an uncontrolled heap overflow that can be triggered by a specially crafted audio stream sent from the guest to the host. While specific details of the vulnerability and its exploitation are not provided in the source document, it is important for defenders to understand the potential impact of such a vulnerability and take appropriate measures to mitigate the risk. Successfully exploiting this type of vulnerability would allow an attacker to gain complete control over the underlying host system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a guest virtual machine (VM) through a compromised application or vulnerable service running within the VM.</li>
<li>The attacker leverages their access within the guest VM to send a specially crafted audio stream to the emulated <code>virtio-snd</code> device.</li>
<li>The crafted audio stream triggers an uncontrolled heap overflow within the QEMU process on the host system.</li>
<li>The heap overflow corrupts memory on the host system, potentially overwriting critical data structures or code.</li>
<li>The attacker carefully manipulates the heap overflow to overwrite function pointers or other execution control data within the QEMU process.</li>
<li>When the QEMU process attempts to execute the overwritten function pointer, control is redirected to attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes within the context of the QEMU process on the host system, allowing them to bypass the VM&rsquo;s isolation.</li>
<li>The attacker escalates privileges to gain root access on the host and compromise the entire system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this QEMU hypervisor escape vulnerability allows a malicious guest operating system to gain complete control over the host system. This can lead to data theft, system compromise, and further lateral movement within the network. The potential impact is significant, especially in cloud environments where multiple VMs share the same physical hardware. Even though specific victim numbers are unavailable, the wide deployment of QEMU implies a broad scope of potential targets across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events on the hypervisor host for QEMU processes spawning child processes with unexpected command-line arguments, as this could indicate exploitation (see rule: &ldquo;Detect QEMU Process Spawning Shell&rdquo;).</li>
<li>Enable network connection logging for QEMU processes on the hypervisor host to detect connections to unusual or malicious IP addresses, which may be used for command and control after a hypervisor escape (see rule: &ldquo;Detect QEMU Outbound Network Connection&rdquo;).</li>
<li>Investigate any unusual or suspicious behavior within guest VMs, such as unexpected resource utilization or network activity, as this may indicate an attempt to exploit the <code>virtio-snd</code> vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>virtualization</category><category>hypervisor</category><category>qemu</category><category>virtio-snd</category><category>heap overflow</category><category>hypervisor escape</category></item><item><title>CVE-2026-41445 KissFFT Integer Overflow leads to Heap Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-41445/</link><pubDate>Wed, 24 Jan 2024 18:23:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-41445/</guid><description>CVE-2026-41445 is a reported integer overflow vulnerability in the KissFFT library that could lead to a heap buffer overflow.</description><content:encoded><![CDATA[<p>CVE-2026-41445 is a newly reported vulnerability affecting the KissFFT library. The vulnerability is located within the <code>kiss_fftndr_alloc()</code> function and results from an integer overflow. Successful exploitation of this vulnerability could allow an attacker to cause a heap buffer overflow, potentially leading to arbitrary code execution. This vulnerability was reported through the Microsoft Security Response Center, indicating a potential impact on Microsoft products or services that utilize the KissFFT library. Defenders should monitor for exploitation attempts and implement mitigations as soon as patches are available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>While exploitation details are currently unavailable, the following attack chain is inferred from the vulnerability type and function name:</p>
<ol>
<li>An attacker crafts a malicious input with specially designed dimensions to be processed by KissFFT.</li>
<li>This malicious input is passed to a function that calls <code>kiss_fftndr_alloc()</code>.</li>
<li>Within <code>kiss_fftndr_alloc()</code>, the attacker&rsquo;s input triggers an integer overflow when calculating the buffer size.</li>
<li>A smaller-than-required memory buffer is allocated on the heap as a result of the overflow.</li>
<li>Subsequent operations attempt to write data larger than the allocated buffer into the undersized heap buffer.</li>
<li>This write operation overflows the heap buffer, corrupting adjacent memory regions.</li>
<li>The memory corruption leads to a crash or, in some cases, arbitrary code execution depending on the overwritten data.</li>
<li>The attacker gains control of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41445 can lead to denial of service due to application crashes, or potentially arbitrary code execution. Since the vulnerability resides in the KissFFT library, applications that utilize this library for FFT processing are potentially vulnerable. The exact impact depends on the privileges of the application using the library. If exploited in a privileged process, it could lead to system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs (category: <code>webserver</code>, product: <code>linux|windows</code>) for unusual patterns in requests that may be attempting to trigger the vulnerability.</li>
<li>Deploy the Sigma rule to detect potential attempts to exploit integer overflows in memory allocation functions.</li>
<li>Apply patches released by Microsoft as soon as they become available to remediate CVE-2026-41445.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>integer-overflow</category><category>heap-overflow</category><category>kissfft</category></item><item><title>GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-gnutls-dtls-overflow/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-gnutls-dtls-overflow/</guid><description>A heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.</description><content:encoded><![CDATA[<p>A heap buffer overflow vulnerability has been identified in the DTLS handshake fragment reassembly logic of GnuTLS. The vulnerability, tracked as CVE-2026-33846, resides within the <code>merge_handshake_packet()</code> function. This function is responsible for matching and merging incoming DTLS handshake fragments. The core issue is the lack of validation for the <code>message_length</code> field across different fragments belonging to the same logical message. An attacker can exploit this flaw by transmitting malicious DTLS fragments that contain inconsistent <code>message_length</code> values. This inconsistency leads the GnuTLS implementation to allocate a buffer based on a smaller, initial fragment but subsequently attempts to write data beyond the allocated buffer&rsquo;s boundaries using the larger, conflicting fragments. This out-of-bounds write on the heap can be triggered remotely without requiring any form of authentication, making it a critical vulnerability. Successful exploitation can lead to application crashes or, potentially, arbitrary memory corruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker initiates a DTLS handshake with a vulnerable GnuTLS server.</li>
<li>The attacker sends a first DTLS handshake fragment with a small <code>message_length</code> value.</li>
<li>The vulnerable <code>merge_handshake_packet()</code> function allocates a heap buffer based on the initial, smaller <code>message_length</code>.</li>
<li>Attacker sends a subsequent DTLS handshake fragment for the same handshake message with a larger, inconsistent <code>message_length</code> value.</li>
<li><code>merge_handshake_packet()</code> incorrectly merges the second fragment into the allocated buffer without proper bounds checking.</li>
<li>The write operation overflows the allocated heap buffer, corrupting adjacent memory.</li>
<li>The application crashes due to memory corruption, or the attacker potentially gains further control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33846 can lead to denial-of-service conditions due to application crashes. Memory corruption could allow for arbitrary code execution, but this is a less likely outcome. Given the widespread use of GnuTLS in various applications and systems, a large number of services could be impacted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for DTLS handshakes with inconsistent <code>message_length</code> values in fragmented handshake messages using the provided Sigma rule <code>Detect DTLS Handshake Fragment Length Mismatch</code>.</li>
<li>Apply available patches from GnuTLS to remediate CVE-2026-33846.</li>
<li>Implement rate limiting for DTLS handshake requests to mitigate potential denial-of-service attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33846</category><category>dtls</category><category>heap overflow</category><category>gnutls</category><category>network</category></item></channel></rss>