Vulnerabilites related to btcd_project - btcd
Vulnerability from fkie_nvd
Published
2022-11-07 04:15
Modified
2024-11-21 07:28
Severity ?
Summary
btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E378CBBF-D617-43FF-B5C4-E3A0204F1039",
                     versionEndExcluding: "0.23.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "549EFCEE-BB9C-4E12-9C15-BDBCF9A1792B",
                     versionEndExcluding: "0.15.2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.",
      },
      {
         lang: "es",
         value: "btcd anterior a 0.23.2, como se usa en Lightning Labs lnd anterior a 0.15.2-beta y otros productos relacionados con Bitcoin, maneja mal la verificación del tamaño de los testigos.",
      },
   ],
   id: "CVE-2022-44797",
   lastModified: "2024-11-21T07:28:28.360",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-07T04:15:09.650",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/pull/1896",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7002",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/pull/1896",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-17 22:15
Modified
2024-11-21 07:18
Summary
Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C76213E-2BE3-4BF3-B5D1-2AA9B6BB0A95",
                     versionEndExcluding: "0.23.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4F9DC3C-AC0A-472A-B74E-2966F1B7D3A9",
                     versionEndExcluding: "0.15.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.",
      },
      {
         lang: "es",
         value: "Lightning Network Daemon (lnd) es una implementación de un nodo de red superpuesto de bitcoin relámpago. Todos los nodos lnd anteriores a la versión `v0.15.4` son vulnerables a un error de análisis de bloques que puede hacer que un nodo entre en un estado degradado una vez encontrado. En este estado degradado, los nodos pueden continuar realizando pagos y reenviando HTLC y cerrar canales. Está prohibido abrir canales y tampoco se detectarán eventos de transacciones en cadena. Esto puede provocar la pérdida de fondos si se investiga el vencimiento de un CSV durante un intento de infracción o si un delta de CLTV expira olvidándose de los fondos en el HTLC. Hay un parche disponible en la versión 0.15.4 de `lnd`. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden usar la llamada RPC `lncli updatechanpolicy` para aumentar su valor CLTV a una cantidad muy alta o aumentar sus políticas de tarifas. Esto evitará que los nodos se enruten a través de su nodo, lo que significa que no puede haber ningún HTLC pendiente.",
      },
   ],
   id: "CVE-2022-39389",
   lastModified: "2024-11-21T07:18:11.677",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.2,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-17T22:15:10.547",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7096",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/pull/7098",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/issues/7096",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/pull/7098",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "security-advisories@github.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-10 17:15
Modified
2024-11-21 03:53
Summary
Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:bcoin:bcoin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D47D52B-8C16-4A9C-ADFC-92B0C8C4C7E2",
                     versionEndExcluding: "1.0.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "54E8DE3C-5E58-4BAB-8C28-EC7CF9749B0B",
                     versionEndExcluding: "0.16.2",
                     versionStartIncluding: "0.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:bitcoinknots:bitcoin_knots:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BD003E0-D891-4340-9818-7231219F72B0",
                     versionEndExcluding: "0.16.2",
                     versionStartIncluding: "0.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.3.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "F24D4ED2-623F-44E4-9BE7-E8F4004A26B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.3.1:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "DFA56887-43B2-4831-883C-D4E9C3B2AD2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.3.2:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "8701A58C-A87A-42DD-B841-960246BE486A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.3.3:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "6B066ACB-83C2-4678-AFAA-0C1A9AA592E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.4.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "C036F3F2-A5ED-47BA-B98C-08788C8E390B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.5.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "CB365F56-5FD5-4C2C-9E37-0352A981C427",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.6.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "F02ECCBD-18C8-4CF9-9611-55454506EA8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.7.0:alpha:*:*:*:*:*:*",
                     matchCriteriaId: "81BA7357-679A-4950-A38F-56E4423339FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.8.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "117660E8-0A79-4558-88C6-00B96C896967",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.9.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "82BC5866-F639-47E1-A083-F383A9E40E18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.10.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "CB7F92D5-42D4-4EFD-929A-15ADC79A79CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.11.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "E386CD33-130A-4064-8112-4B492E7A437F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.11.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "4F0976B7-1D89-41A3-AA8C-035A0646B3FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.12.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "6FFE3B5E-B0FD-469E-AFB6-E5E77964ED4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.13.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "5D6EBD54-5A03-4022-BE66-D3F380CAFADD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.13.0:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "08F558B9-DAD3-47B0-A56B-F574CAC36CF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.20.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "00C62A96-3EBC-4FA4-8BF1-718F5E6B3A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:btcd_project:btcd:0.20.1:beta:*:*:*:*:*:*",
                     matchCriteriaId: "029A3CB7-0076-4908-9EA7-127F549739A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:decred:dcrd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "257D3613-4A8C-4C78-A219-85793EE29132",
                     versionEndExcluding: "1.5.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:litecoin:litecoin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "265C6B30-51DA-45FD-9637-7BA9DFDD27AB",
                     versionEndExcluding: "0.16.2",
                     versionStartIncluding: "0.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:namecoin:namecoin_core:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30BE44E8-2ADB-4F7B-855E-9539AD459278",
                     versionEndExcluding: "0.16.2",
                     versionStartIncluding: "0.16.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.",
      },
      {
         lang: "es",
         value: "Bitcoin Core versiones 0.16.x anteriores a 0.16.2 y Bitcoin Knots versiones 0.16.x anteriores a 0.16.2, permite la denegación de servicio remota por medio de una avalancha de mensajes inv de transacciones múltiples con hashes aleatorios, también se conoce como INVDoS. NOTA: esto también puede afectar a otras criptomonedas, por ejemplo, si se bifurcaron desde Bitcoin Core después del 15/11/2017",
      },
   ],
   id: "CVE-2018-17145",
   lastModified: "2024-11-21T03:53:57.297",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-10T17:15:25.767",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://invdos.net",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://invdos.net/paper/CVE-2018-17145.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://invdos.net",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://invdos.net/paper/CVE-2018-17145.pdf",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2022-44797
Vulnerability from cvelistv5
Published
2022-11-07 00:00
Modified
2024-08-03 14:01
Severity ?
Summary
btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T14:01:31.255Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/issues/7002",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/btcsuite/btcd/pull/1896",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-07T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://github.com/lightningnetwork/lnd/issues/7002",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta",
            },
            {
               url: "https://github.com/btcsuite/btcd/pull/1896",
            },
            {
               url: "https://github.com/btcsuite/btcd/releases/tag/v0.23.2",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-44797",
      datePublished: "2022-11-07T00:00:00",
      dateReserved: "2022-11-07T00:00:00",
      dateUpdated: "2024-08-03T14:01:31.255Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-17145
Vulnerability from cvelistv5
Published
2020-09-10 16:32
Modified
2024-08-05 10:39
Severity ?
Summary
Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T10:39:59.568Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://invdos.net/paper/CVE-2018-17145.pdf",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://invdos.net",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-09-10T16:32:13",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://invdos.net/paper/CVE-2018-17145.pdf",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://invdos.net",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2018-17145",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md",
                     refsource: "MISC",
                     url: "https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md",
                  },
                  {
                     name: "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145",
                     refsource: "MISC",
                     url: "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145",
                  },
                  {
                     name: "https://invdos.net/paper/CVE-2018-17145.pdf",
                     refsource: "CONFIRM",
                     url: "https://invdos.net/paper/CVE-2018-17145.pdf",
                  },
                  {
                     name: "https://invdos.net",
                     refsource: "CONFIRM",
                     url: "https://invdos.net",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2018-17145",
      datePublished: "2020-09-10T16:32:13",
      dateReserved: "2018-09-18T00:00:00",
      dateUpdated: "2024-08-05T10:39:59.568Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-39389
Vulnerability from cvelistv5
Published
2022-11-17 00:00
Modified
2024-08-03 12:07
Summary
Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.
Impacted products
Vendor Product Version
lightningnetwork lnd Version: < v0.15.4-beta
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T12:07:41.957Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/issues/7096",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/pull/7098",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "lnd",
               vendor: "lightningnetwork",
               versions: [
                  {
                     status: "affected",
                     version: " < v0.15.4-beta",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-17T00:00:00",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               url: "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/issues/7096",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/pull/7098",
            },
            {
               url: "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta",
            },
         ],
         source: {
            advisory: "GHSA-hc82-w9v8-83pr",
            discovery: "UNKNOWN",
         },
         title: "Witness Block Parsing DoS Vulnerability in lnd",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2022-39389",
      datePublished: "2022-11-17T00:00:00",
      dateReserved: "2022-09-02T00:00:00",
      dateUpdated: "2024-08-03T12:07:41.957Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}