Low severity3.7NVD Advisory· Published May 11, 2026· Updated May 13, 2026
CVE-2026-8275
CVE-2026-8275
Description
A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
Affected products
1Patches
13731d5576cffFix zerogod IPP chunked body panic via OOB uint64 allocation (#1263)
2 files changed · +21 −10
modules/zerogod/zerogod_acceptor.go+18 −10 modified@@ -117,16 +117,24 @@ func (a *Acceptor) startTCP() (err error) { } } else { a.mod.Debug("accepted %s connection for service %s (port %d): %v", a.proto, tui.Green(a.service), a.port, conn.RemoteAddr()) - go a.handler.Handle(&HandlerContext{ - service: a.service, - mod: a.mod, - client: conn, - srvHost: a.srvHost, - srvPort: int(a.port), - srvTLS: a.tlsConfig != nil, - ippAttributes: a.ippAttributes, - httpPaths: a.httpPaths, - }) + go func() { + ctx := &HandlerContext{ + service: a.service, + mod: a.mod, + client: conn, + srvHost: a.srvHost, + srvPort: int(a.port), + srvTLS: a.tlsConfig != nil, + ippAttributes: a.ippAttributes, + httpPaths: a.httpPaths, + } + defer func() { + if r := recover(); r != nil { + a.mod.Error("panic in %s handler for %s: %v", a.service, conn.RemoteAddr(), r) + } + }() + a.handler.Handle(ctx) + }() } } a.mod.Debug("%s listener for port %d (%s) stopped", a.proto, a.port, tui.Green(a.service))
modules/zerogod/zerogod_ipp_primitives.go+3 −0 modified@@ -13,6 +13,7 @@ import ( ) const IPP_CHUNK_MAX_LINE_SIZE = 1024 +const IPP_CHUNK_MAX_SIZE = 10 * 1024 * 1024 // 10 MB var IPP_REQUEST_NAMES = map[int16]string{ // https://tools.ietf.org/html/rfc2911#section-4.4.15 @@ -136,6 +137,8 @@ func ippReadChunkedBody(ctx *HandlerContext) ([]byte, error) { return nil, fmt.Errorf("error reading next chunk size: %v", err) } else if chunkSize == 0 { break + } else if chunkSize > IPP_CHUNK_MAX_SIZE { + return nil, fmt.Errorf("chunk size %d exceeds maximum allowed size of %d bytes", chunkSize, IPP_CHUNK_MAX_SIZE) } else { chunk := make([]byte, chunkSize) if n, err := ctx.client.Read(chunk); err != nil {
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-322p-rrj6-j44gghsaADVISORY
- github.com/bettercap/bettercap/commit/3731d5576cffae9eefe3721cd46a40933304129fnvd
- github.com/bettercap/bettercap/issues/1263nvd
- github.com/bettercap/bettercap/pull/1264nvd
- github.com/bettercap/bettercap/releases/tag/v2.41.7ghsa
- nvd.nist.gov/vuln/detail/CVE-2026-8275ghsa
- vuldb.com/submit/811145nvd
- vuldb.com/vuln/362572nvd
- vuldb.com/vuln/362572/ctinvd
News mentions
0No linked articles in our index yet.