<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Protobuf — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/protobuf/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 21:04:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/protobuf/feed.xml" rel="self" type="application/rss+xml"/><item><title>Protobuf PHP Library Denial of Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-protobuf-dos/</link><pubDate>Wed, 25 Mar 2026 21:04:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-protobuf-dos/</guid><description>A denial-of-service vulnerability exists in the Protobuf PHP library due to maliciously crafted messages with negative varints or deep recursion, leading to application crashes and impacting service availability.</description><content:encoded><![CDATA[<p>A high-severity denial-of-service (DoS) vulnerability has been identified in the Protobuf PHP library, affecting versions prior to 4.33.6. The vulnerability stems from the improper handling of maliciously structured Protocol Buffer messages. Specifically, messages containing negative varints or exhibiting deep recursion can trigger excessive resource consumption during parsing. This can lead to application crashes, thereby disrupting service availability. Patches addressing this vulnerability have been released in versions 5.34.0-RC1 and 4.33.6 of the Protobuf library. Defenders should prioritize updating vulnerable systems to these patched versions to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Protocol Buffer message.</li>
<li>The message contains either negative varints or exploits deep recursion.</li>
<li>The attacker sends the malicious message to a PHP application using the vulnerable Protobuf library.</li>
<li>The PHP application attempts to parse the malicious message using the affected Protobuf library.</li>
<li>During parsing, the negative varints or deep recursion trigger excessive resource consumption, such as CPU or memory.</li>
<li>The application becomes unresponsive due to resource exhaustion.</li>
<li>The application crashes, leading to a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, rendering affected applications unavailable. This can impact any service relying on the Protobuf PHP library to process untrusted data, such as APIs, message queues, or data storage systems. The number of affected services depends on the prevalence of the vulnerable Protobuf library within an organization&rsquo;s infrastructure. This issue can lead to significant disruption and potential data loss or corruption if applications crash while processing critical data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>composer/google/protobuf</code> package to version 4.33.6 or later to remediate the vulnerability.</li>
<li>Monitor web server logs for anomalous request patterns indicative of exploitation attempts targeting Protobuf message processing (webserver log source).</li>
<li>Implement rate limiting and input validation on services that process Protocol Buffer messages to mitigate the impact of malicious inputs (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>protobuf</category><category>dos</category><category>php</category></item></channel></rss>