| 제목 | osrg GoBGP 4.3.0 Improper Input Validation |
|---|
| 설명 | A vulnerability was found in osrg GoBGP version 4.3.0. It affects the BGPHeader.DecodeFromBytes function in the pkg/packet/bgp/bgp.go file. The vulnerability is classified as improper input validation because the parser does not validate the 16-byte BGP Marker field. According to RFC 4271, all 16 bytes of the Marker field must be set to 0xFF. However, the current implementation only reads the Length and Type fields from offsets 16 and 18, and does not verify bytes 0-15 at all. As a result, BGP messages with arbitrary Marker values are incorrectly accepted instead of being rejected as malformed. This violates protocol standards and may reduce resilience against malformed or injected traffic on an established TCP session. |
|---|
| 원천 | ⚠️ https://github.com/osrg/gobgp/commit/f0f24a2a901cbf159260698211ab15c583ced131 |
|---|
| 사용자 | Sunxj (UID 96442) |
|---|
| 제출 | 2026. 03. 14. PM 01:00 (20 날 ago) |
|---|
| 모더레이션 | 2026. 03. 30. AM 09:50 (16 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 354156 [osrg GoBGP 까지 4.3.0 BGP Header pkg/packet/bgp/bgp.go BGPHeader.DecodeFromBytes 권한 상승] |
|---|
| 포인트들 | 20 |
|---|