<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Integer Underflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/integer-underflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 07:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/integer-underflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>osrg GoBGP Integer Underflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</link><pubDate>Mon, 04 May 2026 07:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</guid><description>osrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.</description><content:encoded><![CDATA[<p>A vulnerability exists in osrg GoBGP, specifically in versions up to 4.3.0. The flaw is located within the <code>parseRibEntry</code> function of the <code>pkg/packet/mrt/mrt.go</code> file. This integer underflow vulnerability, identified as CVE-2026-7736, can be triggered remotely by an attacker who sends malicious or unexpected data to the affected function. Successful exploitation could lead to a denial-of-service condition or other unspecified consequences. Users are advised to upgrade to version 4.4.0, which contains the patch identified as 76d911046344a3923cbe573364197aa081944592, to mitigate the risk. The vulnerability poses a risk to network infrastructure relying on the BGP protocol, potentially impacting routing stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable GoBGP instance running a version prior to 4.4.0.</li>
<li>The attacker crafts a malicious MRT (Multi-Threaded Routing Toolkit) message.</li>
<li>The attacker sends the crafted MRT message to the vulnerable GoBGP instance. This is typically done over a TCP connection to the BGP port (179).</li>
<li>The <code>parseRibEntry</code> function processes the malicious MRT message.</li>
<li>Due to the integer underflow vulnerability, the <code>parseRibEntry</code> function calculates an incorrect value.</li>
<li>This incorrect value leads to unexpected behavior such as a crash or resource exhaustion.</li>
<li>The GoBGP process becomes unstable or terminates.</li>
<li>This disrupts BGP routing, potentially leading to a denial-of-service condition for network services that rely on BGP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow a remote attacker to disrupt BGP routing, leading to a denial-of-service condition. The precise impact will depend on the specific network configuration and the role of the affected GoBGP instance. Systems relying on the BGP protocol for routing information could experience connectivity issues or routing instability. While the number of affected deployments is unknown, any organization utilizing GoBGP in their network infrastructure is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 or later to remediate the integer underflow vulnerability described in CVE-2026-7736.</li>
<li>Monitor network traffic for unexpected MRT messages being sent to GoBGP instances using the Sigma rule provided below.</li>
<li>Review and harden BGP configurations to limit exposure and potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>integer underflow</category><category>bgp</category></item><item><title>CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-chacha-integer-underflow/</link><pubDate>Thu, 30 Apr 2026 08:43:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chacha-integer-underflow/</guid><description>CVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.</description><content:encoded><![CDATA[<p>CVE-2026-5778 is a critical security vulnerability affecting an unspecified Microsoft product. This vulnerability stems from an integer underflow within the ChaCha decryption process. While the specific product affected is not detailed in the initial advisory, the vulnerability&rsquo;s nature suggests a potential impact on any Microsoft software utilizing ChaCha for encryption or decryption purposes. Successful exploitation of this vulnerability could lead to out-of-bounds memory access, potentially allowing attackers to execute arbitrary code or cause a denial-of-service condition. This vulnerability highlights the importance of secure coding practices and rigorous testing in cryptographic implementations. Defenders should monitor for updates and apply patches as soon as they become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious input designed to trigger the ChaCha decryption routine within the vulnerable Microsoft product.</li>
<li>The malicious input exploits a weakness in the bounds checking logic related to the ChaCha algorithm.</li>
<li>During the decryption process, a specially crafted integer value underflows.</li>
<li>This integer underflow results in an incorrect memory address calculation.</li>
<li>The incorrect memory address calculation leads to an out-of-bounds memory access.</li>
<li>The out-of-bounds access allows the attacker to read sensitive data or overwrite memory locations.</li>
<li>By overwriting critical memory locations, the attacker can potentially inject and execute arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5778 can have severe consequences, including arbitrary code execution and denial of service. The impact will vary depending on the affected product and the specific context of the vulnerability. If exploited, this vulnerability could allow an attacker to gain complete control of a system or disrupt its availability, leading to significant data loss, system compromise, and reputational damage. The lack of specific victim and sector information makes assessing the scope difficult, but all organizations using Microsoft products should consider this a high-priority vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft&rsquo;s security update guide for specific product advisories related to CVE-2026-5778 and apply patches immediately upon release.</li>
<li>Implement runtime memory protection mechanisms to detect and prevent out-of-bounds memory access attempts.</li>
<li>Deploy the Sigma rule below to detect suspicious processes that may be exploiting this vulnerability via memory access patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>integer-underflow</category><category>memory-corruption</category><category>cve</category></item><item><title>strongSwan EAP-TTLS AVP Integer Underflow Vulnerability (CVE-2026-25075)</title><link>https://feed.craftedsignal.io/briefs/2026-03-strongswan-dos/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-strongswan-dos/</guid><description>An integer underflow vulnerability in strongSwan's EAP-TTLS AVP parser allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication, leading to excessive memory allocation or a NULL pointer dereference.</description><content:encoded>&lt;p>The strongSwan VPN suite is susceptible to an integer underflow vulnerability (CVE-2026-25075) affecting versions 4.5.0 up to 6.0.4. This flaw resides within the EAP-TTLS AVP (Attribute Value Pair) parser. A remote, unauthenticated attacker can exploit this vulnerability by sending specifically crafted AVP data during the IKEv2 (Internet Key Exchange version 2) authentication process. Successful exploitation leads to a denial-of-service condition due to excessive memory allocation or a NULL…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>integer-underflow</category><category>strongSwan</category><category>CVE-2026-25075</category></item></channel></rss>