Impact
An out‑of‑bounds read vulnerability exists in the BMP parser of GoBGP, specifically within the BMPPeerUpNotification.ParseBody and BMPStatisticsReport.ParseBody functions in bmp.go. Sending a crafted BMP message can cause the parser to read beyond the bounds of a buffer, potentially leaking sensitive memory contents or causing a crash. The vulnerability is linked to CWE-119 and CWE-125.
Affected Systems
The affected product is osrg GoBGP, in all releases up to and including 4.3.0. The issue has been addressed in release 4.4.0. The patch that resolves this flaw is identified by commit bc77597d42335c78464bc8e15a471d887bbdf260.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity, and the exploit can be triggered remotely by an attacker who can send BMP packets to the server; authentication is not required. Because the vulnerability involves an out‑of‑bounds read, a successful exploit could lead to information disclosure or a denial of service if the service crashes. The EPSS score is not available and the vulnerability is not listed in CISA KEV, suggesting it is a known risk but not widely exploited yet. The risk is mitigated by applying the official patch or upgrading to the fixed version.
OpenCVE Enrichment