
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in GoBGP before version 3.35.0. The vulnerability exists in pkg/packet/rtr/rtr.go where the software does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message (NVD, GitHub Commit).
The vulnerability is classified as an Off-by-one Error (CWE-193). The CVSS v3.1 base score is 6.8 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H. The issue stems from insufficient validation of input length in the RTR message handling component (NVD).
The vulnerability could lead to a situation where the application attempts to process RTR messages without having all required bytes available, potentially resulting in application crashes or other undefined behavior (NVD).
Users should upgrade to GoBGP version 3.35.0 or later which contains the fix for this vulnerability. The fix has been implemented in commit 5693c58a4815cc6327b8d3b6980f0e5aced28abe (GitHub Commit, GitHub Compare).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."