A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue.
https://vuldb.com/vuln/354155/cti
https://vuldb.com/submit/780179
https://github.com/osrg/gobgp/pull/3342
https://github.com/osrg/gobgp/commit/67c059413470df64bc20801c46f64058e88f800f
Published: 2026-03-30
Updated: 2026-04-01
Base Score: 2.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P
Severity: Low
Base Score: 3.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Severity: Low
Base Score: 6.3
Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00047