First published: Mon Apr 21 2025(Updated: )
An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GoBGP | <3.35.0 | |
go/github.com/osrg/gobgp/v3 | <3.35.0 | 3.35.0 |
go/github.com/osrg/gobgp | <3.35.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43973 is classified as a moderate severity vulnerability due to the potential for malformed RTR messages.
To fix CVE-2025-43973, upgrade GoBGP to version 3.35.0 or later, where the input length verification issue has been addressed.
The main issue in CVE-2025-43973 is that GoBGP does not verify whether the input length matches the availability of all bytes for an RTR message.
CVE-2025-43973 affects all versions of GoBGP prior to 3.35.0.
CVE-2025-43973 is considered a remote vulnerability as it can be exploited through BGP routing messages.