Vulnerability Description
The SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM client-final-message. A malicious backend that sends a SCRAM server-final-message with a long nonce can trigger a stack overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pgbouncer | Pgbouncer | < 1.25.2 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-6665?
CVE-2026-6665 is a vulnerability with a CVSS score of 8.1 (HIGH). The SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM client-final-message. A malicious backend that sends a SCRAM ser...
How severe is CVE-2026-6665?
CVE-2026-6665 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6665?
Check the references section above for vendor advisories and patch information. Affected products include: Pgbouncer Pgbouncer.