Impact
A vulnerability was identified in osrg GoBGP up to version 4.3.0. The flaw resides in the parseRibEntry function of the mrt.go file and causes an integer underflow when processing specific MRT data. An attacker can exploit this by supplying crafted routing data to a GoBGP instance, potentially leading to corrupted routing entries or unintended behavior caused by the underflow. The issue is not limited to local inputs; the description indicates that it can be launched remotely through network interactions.
Affected Systems
OSRG GoBGP versions 4.3.0 and earlier are affected. The fix is included in release 4.4.0 and later, as documented in the commit 76d911046344a3923cbe573364197aa081944592.
Risk and Exploitability
The CVSS score of 6.9 reflects medium severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, relying on external MRT input to a GoBGP process. The patch addresses the integer underflow and eliminates the advertised risk.
OpenCVE Enrichment