<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Oob-Write — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/oob-write/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 20:20:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/oob-write/feed.xml" rel="self" type="application/rss+xml"/><item><title>Pillow Out-of-Bounds Write Vulnerability in PSD Processing (CVE-2026-42311)</title><link>https://feed.craftedsignal.io/briefs/2024-01-pillow-oob-write/</link><pubDate>Mon, 04 May 2026 20:20:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pillow-oob-write/</guid><description>Pillow versions 10.3.0 through 12.1.1 are vulnerable to an out-of-bounds write in PSD image decoding/encoding due to an integer overflow when computing tile extent sums, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>Pillow, a popular Python image processing library, is vulnerable to an out-of-bounds write vulnerability (CVE-2026-42311) when processing PSD files. Specifically, versions 10.3.0 up to 12.1.1 contain a flaw in how they handle tile extents in PSD image decoding and encoding. The vulnerability arises from an integer overflow when calculating tile extent sums, which bypasses intended bounds checks. This allows a specially crafted PSD image with malicious tile dimensions to trigger an out-of-bounds write in <code>src/decode.c</code> and <code>src/encode.c</code>. Successful exploitation could lead to memory corruption, resulting in a crash or, more critically, arbitrary code execution. The issue was initially addressed in version 12.1.1 (CVE-2026-25990) but the fix was incomplete due to the integer overflow issue. The vulnerability is resolved in Pillow version 12.2.0 by avoiding the addition of extents before comparison.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious PSD image file with specific tile dimensions designed to trigger an integer overflow.</li>
<li>The victim&rsquo;s application, using a vulnerable version of Pillow (10.3.0 - 12.1.1), attempts to process the malicious PSD file.</li>
<li>During PSD image decoding/encoding, Pillow calculates the tile extent sums.</li>
<li>Due to the crafted tile dimensions, the integer overflow occurs, causing the calculated extent sums to wrap around.</li>
<li>The wrapped-around extent sums bypass the bounds checks implemented in Pillow.</li>
<li>An out-of-bounds write operation occurs in <code>src/decode.c</code> or <code>src/encode.c</code>, corrupting memory.</li>
<li>The memory corruption leads to either a crash of the application or, in a more severe scenario, allows the attacker to inject and execute arbitrary code.</li>
<li>The attacker gains control of the affected system, potentially leading to further malicious activities like data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to denial of service (application crash) or, more critically, arbitrary code execution. If an attacker can execute code on a system, they could potentially gain complete control of the system. This could lead to data theft, system compromise, and further propagation of attacks. The vulnerability affects any application that uses the Pillow library to process PSD files, potentially impacting a wide range of software across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Pillow to version 12.2.0 or later to remediate CVE-2026-42311, which corrects the integer overflow issue and prevents the out-of-bounds write.</li>
<li>Monitor process creations for the execution of Python scripts (<code>python.exe</code>, <code>python3</code>) that process untrusted PSD files. Deploy the Sigma rule <code>Detect Pillow PSD Processing</code> to identify potentially malicious PSD processing activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>pillow</category><category>oob-write</category><category>integer-overflow</category><category>psd</category><category>memory-corruption</category></item><item><title>Google Chrome GPU Out-of-Bounds Write Vulnerability (CVE-2026-6314)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-gpu-oob-write/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-gpu-oob-write/</guid><description>Google Chrome versions prior to 147.0.7727.101 are vulnerable to an out-of-bounds write in the GPU process (CVE-2026-6314), allowing a remote attacker with GPU process compromise to potentially perform a sandbox escape via a crafted HTML page.</description><content:encoded><![CDATA[<p>CVE-2026-6314 is a security vulnerability affecting Google Chrome versions prior to 147.0.7727.101. The vulnerability resides within the GPU process and is classified as an out-of-bounds write. Successful exploitation could allow a remote attacker who has already compromised the GPU process to perform a sandbox escape, potentially gaining broader system access. The vulnerability can be triggered by a crafted HTML page. The Chromium security team has rated this vulnerability as High severity. This vulnerability was patched in the 147.0.7727.101 release.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTML page designed to trigger the out-of-bounds write in the GPU process.</li>
<li>The victim visits the malicious HTML page using a vulnerable version of Google Chrome.</li>
<li>The HTML page leverages JavaScript to initiate a GPU-related operation that triggers the vulnerable code path.</li>
<li>The GPU process attempts to write data outside of the intended memory buffer due to a flaw in the code.</li>
<li>This out-of-bounds write corrupts memory within the GPU process.</li>
<li>The attacker leverages the memory corruption to overwrite critical data structures or code within the GPU process.</li>
<li>By manipulating the GPU process&rsquo;s memory, the attacker attempts to escape the Chrome sandbox.</li>
<li>If successful, the attacker gains the ability to execute arbitrary code outside the sandbox, potentially compromising the user&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6314 allows an attacker to escape the Chrome sandbox. This allows the attacker to potentially execute arbitrary code on the victim&rsquo;s machine. While the exact number of victims is unknown, all users of Google Chrome versions prior to 147.0.7727.101 are potentially vulnerable. A successful sandbox escape could lead to data theft, malware installation, or other malicious activities, depending on the privileges of the compromised user.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to version 147.0.7727.101 or later to patch CVE-2026-6314.</li>
<li>Deploy the Sigma rule <code>Detect Chrome GPU Process Crash</code> to identify potential exploitation attempts based on abnormal process termination.</li>
<li>Monitor web server logs for requests to suspicious HTML pages (cs-uri-query, cs-uri-stem) that could be used to deliver the exploit.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome</category><category>gpu</category><category>oob-write</category><category>sandbox-escape</category></item><item><title>Out-of-bounds Write Vulnerability in DualSenseY-v2</title><link>https://feed.craftedsignal.io/briefs/2026-03-dualsensey-oob-write/</link><pubDate>Tue, 24 Mar 2026 06:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dualsensey-oob-write/</guid><description>CVE-2026-33850 is an out-of-bounds write vulnerability in WujekFoliarz DualSenseY-v2 before version 54, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service by writing data outside the allocated buffer.</description><content:encoded>&lt;p>An out-of-bounds write vulnerability, identified as CVE-2026-33850, exists in WujekFoliarz DualSenseY-v2 before version 54. This flaw allows an attacker to write data beyond the boundaries of an allocated buffer, potentially leading to arbitrary code execution or a denial-of-service condition. The vulnerability was reported by the Government Technology Agency of Singapore Cyber Security Group (GovTech CSG). Successful exploitation of this vulnerability requires user interaction, as indicated by…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>oob-write</category><category>dualsensey-v2</category></item><item><title>rust-openssl AES Key Wrap Out-of-Bounds Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openssl-oob-write/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openssl-oob-write/</guid><description>The rust-openssl package is vulnerable to an out-of-bounds write due to an incorrect bounds assertion in the `aes::unwrap_key()` function, potentially leading to arbitrary code execution if attacker-controlled buffer sizes are permitted.</description><content:encoded><![CDATA[<p>The rust-openssl crate, specifically versions 0.10.24 through 0.10.77, contains a critical vulnerability in the <code>aes::unwrap_key()</code> function. This function is intended to perform AES key wrapping, a process used to securely encrypt cryptographic keys. The vulnerability arises from an inverted bounds check on the output buffer size, where the function incorrectly validates the size of the output buffer against the input buffer size. This flaw allows an attacker to potentially write beyond the allocated memory region, leading to a crash or, in more sophisticated scenarios, arbitrary code execution. Exploitation requires that the vulnerable application utilizes AES keywrap and allows the attacker to control the buffer sizes passed to <code>aes::unwrap_key()</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application using the vulnerable rust-openssl crate (versions 0.10.24 - 0.10.77) and the <code>aes::unwrap_key()</code> function.</li>
<li>The attacker crafts a malicious input with specific sizes for the input and output buffers to trigger the vulnerability.</li>
<li>The attacker provides a crafted input buffer (<code>in_</code>) and a smaller-than-required output buffer (<code>out</code>) to the vulnerable <code>aes::unwrap_key()</code> function.</li>
<li>The incorrect bounds assertion <code>out.len() + 8 &lt;= in_.len()</code> passes, as the <code>out</code> buffer is intentionally smaller than <code>in_.len() - 8</code>.</li>
<li>The <code>aes::unwrap_key()</code> function proceeds with the AES key wrapping process.</li>
<li>During the key unwrapping process, the function attempts to write <code>in_.len() - 8 - out.len()</code> bytes beyond the allocated boundary of the <code>out</code> buffer.</li>
<li>This out-of-bounds write corrupts adjacent memory regions within the application&rsquo;s address space.</li>
<li>Depending on the overwritten memory, the attacker can potentially achieve arbitrary code execution or cause a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to various adverse consequences, including denial of service, information disclosure, or arbitrary code execution. Applications utilizing AES keywrap and accepting attacker-controlled buffer sizes are at the highest risk. The specific impact depends on the application&rsquo;s memory layout and the attacker&rsquo;s ability to control the overwritten memory. Given the widespread use of OpenSSL for cryptographic operations, this vulnerability poses a significant threat to vulnerable applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>rust-openssl</code> crate to version 0.10.78 or later to patch the vulnerability as indicated in <a href="https://github.com/advisories/GHSA-8c75-8mhr-p7r9">GHSA-8c75-8mhr-p7r9</a>.</li>
<li>Audit code using <code>aes::unwrap_key()</code> to ensure input and output buffer sizes are validated correctly to prevent out-of-bounds writes.</li>
<li>Implement runtime memory protection mechanisms to detect and prevent out-of-bounds writes, mitigating the impact of this and similar vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openssl</category><category>aes</category><category>keywrap</category><category>oob-write</category><category>memory-corruption</category></item></channel></rss>