Description
The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.
Published: 2026-03-26
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The msgpack decoder in the shamaton/msgpack Go library fails to validate the length of the input buffer when processing truncated fixed‑extension (fixext) data types, which have format codes 0xd4 through 0xd8. This oversight allows the decoder to read beyond the end of the supplied data, resulting in an out‑of‑bounds memory read. In the Go runtime, the read causes a panic that terminates the process. The vulnerability does not grant any code execution or information disclosure; its primary effect is to bring the host application to an unresponsive state. The weakness is an improper restriction of operations within the bounds of a memory buffer, a classic out‑of‑bounds read condition.

Affected Systems

The issue is present in the shamaton/msgpack repository for all tagged releases of the v2 and v3 series, as well as the master branch. The supplied data does not list specific patch versions that fixed the issue, so any installed version of these libraries is potentially vulnerable. Developers using the decoder to process untrusted input data should assume that all versions are affected until a patch is confirmed.

Risk and Exploitability

Because the exploit requires only crafted input data to be fed to a decodable message, it can be performed by any external party that can supply malformed payloads to the application. The lack of a defined CVSS score or EPSS value leaves the severity assessment to the analyst, but the potential to crash a service without additional privileges or system-wide impact indicates a moderate risk. The vulnerability is not reported in the CISA KEV catalog, and no revised exploit probability score is available, suggesting that while feasible, it has not yet been widely observed in the wild. Attackers who can control or tamper with the data stream to the library can induce a denial‑of‑service condition with a single request, but cannot achieve code execution or compromise data confidentiality.

Generated by OpenCVE AI on March 26, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest release of shamaton/msgpack that contains the patch for this buffer validation issue.
  • If immediate update is not possible, restrict the library to process data only from trusted sources and validate input length before passing to the decoder.
  • Consider implementing a wrapper around the decoder to catch panic recoveries and restart the service gracefully.
  • Monitor application logs for panic events or unexpected terminations and investigate any incidents.

Generated by OpenCVE AI on March 26, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-805
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Shamaton
Shamaton msgpack
Vendors & Products Shamaton
Shamaton msgpack

Thu, 26 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.
Title Denial of service in github.com/shamaton/msgpack
References

Subscriptions

Shamaton Msgpack
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-03-26T19:40:51.686Z

Reserved: 2026-03-11T16:38:46.556Z

Link: CVE-2026-32284

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T20:16:12.087

Modified: 2026-03-26T20:16:12.087

Link: CVE-2026-32284

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-26T19:40:51Z

Links: CVE-2026-32284 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:24Z

Weaknesses