<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Osrg — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/osrg/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 07:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/osrg/feed.xml" rel="self" type="application/rss+xml"/><item><title>osrg GoBGP Integer Underflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</link><pubDate>Mon, 04 May 2026 07:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-integer-underflow/</guid><description>osrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.</description><content:encoded><![CDATA[<p>A vulnerability exists in osrg GoBGP, specifically in versions up to 4.3.0. The flaw is located within the <code>parseRibEntry</code> function of the <code>pkg/packet/mrt/mrt.go</code> file. This integer underflow vulnerability, identified as CVE-2026-7736, can be triggered remotely by an attacker who sends malicious or unexpected data to the affected function. Successful exploitation could lead to a denial-of-service condition or other unspecified consequences. Users are advised to upgrade to version 4.4.0, which contains the patch identified as 76d911046344a3923cbe573364197aa081944592, to mitigate the risk. The vulnerability poses a risk to network infrastructure relying on the BGP protocol, potentially impacting routing stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable GoBGP instance running a version prior to 4.4.0.</li>
<li>The attacker crafts a malicious MRT (Multi-Threaded Routing Toolkit) message.</li>
<li>The attacker sends the crafted MRT message to the vulnerable GoBGP instance. This is typically done over a TCP connection to the BGP port (179).</li>
<li>The <code>parseRibEntry</code> function processes the malicious MRT message.</li>
<li>Due to the integer underflow vulnerability, the <code>parseRibEntry</code> function calculates an incorrect value.</li>
<li>This incorrect value leads to unexpected behavior such as a crash or resource exhaustion.</li>
<li>The GoBGP process becomes unstable or terminates.</li>
<li>This disrupts BGP routing, potentially leading to a denial-of-service condition for network services that rely on BGP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow a remote attacker to disrupt BGP routing, leading to a denial-of-service condition. The precise impact will depend on the specific network configuration and the role of the affected GoBGP instance. Systems relying on the BGP protocol for routing information could experience connectivity issues or routing instability. While the number of affected deployments is unknown, any organization utilizing GoBGP in their network infrastructure is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 or later to remediate the integer underflow vulnerability described in CVE-2026-7736.</li>
<li>Monitor network traffic for unexpected MRT messages being sent to GoBGP instances using the Sigma rule provided below.</li>
<li>Review and harden BGP configurations to limit exposure and potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>integer underflow</category><category>bgp</category></item><item><title>GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in the osrg GoBGP software, specifically affecting versions up to 4.3.0. The vulnerability resides in the <code>PathAttributeAigp.DecodeFromBytes</code> function of the <code>pkg/packet/bgp/bgp.go</code> file, which is part of the AIGP Attribute Parser component. An attacker can remotely trigger this vulnerability by sending a crafted BGP message containing a malicious AIGP attribute. Successful exploitation could lead to arbitrary code execution on the affected system. GoBGP is an open source BGP implementation. Organizations using GoBGP for routing purposes should upgrade to version 4.4.0 or apply the provided patch (51ad1ada06cb41ce47b7066799981816f50b7ced) to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoBGP instance running a vulnerable version (&lt;= 4.3.0).</li>
<li>Attacker crafts a malicious BGP update message containing a specially crafted AIGP attribute.</li>
<li>The crafted AIGP attribute is designed to trigger a buffer overflow in the <code>PathAttributeAigp.DecodeFromBytes</code> function.</li>
<li>The attacker sends the malicious BGP update message to the vulnerable GoBGP instance over TCP port 179.</li>
<li>The GoBGP instance receives the message and attempts to parse the AIGP attribute using the vulnerable function.</li>
<li>The <code>PathAttributeAigp.DecodeFromBytes</code> function fails to properly validate the size of the input data, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code on the GoBGP instance, gaining control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected GoBGP instance. This can lead to a complete compromise of the routing infrastructure, allowing the attacker to intercept, modify, or disrupt network traffic. In service provider environments, this could affect a large number of customers and cause significant network outages. Given the CVSS v3.1 score of 7.3, this is considered a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 to remediate the vulnerability as mentioned in the overview.</li>
<li>Apply the patch <code>51ad1ada06cb41ce47b7066799981816f50b7ced</code> to the affected component to mitigate the vulnerability if upgrading is not immediately possible.</li>
<li>Monitor network traffic for BGP update messages with unusually large or malformed AIGP attributes, using a network intrusion detection system.</li>
<li>Deploy the Sigma rule detecting connections to port 179 from unusual sources to identify potentially malicious hosts attempting to exploit the vulnerability.</li>
<li>Review and harden BGP configuration to limit accepted peer connections to trusted sources only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7735</category><category>buffer-overflow</category><category>bgp</category></item><item><title>GoBGP Remote Denial of Service via Malformed BGP UPDATE Message</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-gobgp-dos/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-gobgp-dos/</guid><description>A remote Denial of Service (DoS) vulnerability exists in GoBGP version 4.2.0 and earlier, where a malformed BGP UPDATE message can trigger a runtime error (index out of range panic), crashing the GoBGP process. This occurs during the processing of 4-byte AS attributes when the message structure causes an internal slice index shift that is not properly handled. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon, leading to a complete loss of routing capabilities.</description><content:encoded><![CDATA[<p>A remote Denial of Service vulnerability exists in GoBGP that can be triggered by a malformed BGP UPDATE message, specifically when handling 4-byte AS attributes. The vulnerability, identified as CVE-2026-41643, affects GoBGP version 4.2.0 and earlier. The attack involves sending a crafted BGP UPDATE message that causes an index-out-of-range panic in the <code>UpdatePathAttrs4ByteAs</code> function within <code>internal/pkg/table/message.go</code>. This panic results in the GoBGP process crashing, leading to a loss of routing capabilities. A malicious peer or a malformed route propagated through a transit provider can exploit this vulnerability to consistently crash the BGP daemon. This can disrupt network operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a BGP peering session with a vulnerable GoBGP instance (version 4.2.0 or earlier).</li>
<li>The attacker crafts a malicious BGP UPDATE message. This message contains both an AS_PATH (Type 2) and an AS4_PATH (Type 17) attribute.</li>
<li>The crafted message orders the attributes such that the AS4_PATH appears before the AS_PATH.</li>
<li>The AS4_PATH attribute is intentionally malformed to trigger a validation error.</li>
<li>The GoBGP process attempts to remove the invalid AS4_PATH attribute from the <code>msg.PathAttributes</code> slice in the <code>UpdatePathAttrs4ByteAs</code> function.</li>
<li>Removing the AS4_PATH causes subsequent attributes in the slice to shift left, altering their indices.</li>
<li>The function attempts to access the AS_PATH attribute using a stale index (asAttrPos) calculated before the slice modification.</li>
<li>Due to the index shift, accessing <code>msg.PathAttributes[asAttrPos]</code> results in an out-of-bounds access, triggering a panic and crashing the GoBGP process, causing a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability leads to a remote Denial of Service (DoS) condition. Any GoBGP deployment (v4.2.0 and earlier) that accepts BGP UPDATE messages from peers is vulnerable. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon. This results in a complete loss of routing capabilities, disrupting network services, and causing potential outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GoBGP to a patched version that addresses CVE-2026-41643.</li>
<li>Monitor BGP UPDATE messages for malformed AS4_PATH attributes (Type 17) appearing before AS_PATH attributes (Type 2) using a network intrusion detection system.</li>
<li>Implement rate limiting on BGP UPDATE messages from untrusted peers to mitigate the impact of a DoS attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial of service</category><category>bgp</category><category>network</category></item></channel></rss>