GHSA-wjxw-gh3m-7pm5

Suggest an improvement
Source
https://github.com/advisories/GHSA-wjxw-gh3m-7pm5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wjxw-gh3m-7pm5/GHSA-wjxw-gh3m-7pm5.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-wjxw-gh3m-7pm5
Aliases
Related
Published
2022-05-24T20:54:55Z
Modified
2024-08-21T15:27:36.323668Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
DoS via malicious p2p message in Go Ethereum
Details

Impact

A vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node.

Patches

The following PR addresses the problem: https://github.com/ethereum/go-ethereum/pull/24507

Workarounds

Aside from applying the PR linked above, setting loglevel to default level (INFO) makes the node not vulnerable to this attack.

Credits

This bug was reported by nrv via bounty@ethereum.org, who has gracefully requested that the bounty rewards be donated to Médecins sans frontières.

For more information

If you have any questions or comments about this advisory: * Open an issue in go-ethereum

Database specific
{
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-05-24T20:54:55Z",
    "nvd_published_at": "2022-05-20T17:15:00Z",
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Go / github.com/ethereum/go-ethereum

Package

Name
github.com/ethereum/go-ethereum
View open source insights on deps.dev
Purl
pkg:golang/github.com/ethereum/go-ethereum

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.17