All the vulnerabilites related to ethereum - go-ethereum
cve-2023-40591
Vulnerability from cvelistv5
Published
2023-09-06 18:07
Modified
2024-09-26 15:19
Severity ?
EPSS score ?
Summary
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix is included in geth version `1.12.1-stable`, i.e, `1.12.2-unstable` and onwards. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm | x_refsource_CONFIRM | |
https://geth.ethereum.org/docs/developers/geth-developer/disclosures | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: < 1.12.1-stable |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm" }, { "name": "https://geth.ethereum.org/docs/developers/geth-developer/disclosures", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://geth.ethereum.org/docs/developers/geth-developer/disclosures" }, { "name": "https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "go_ethereum", "vendor": "ethereum", "versions": [ { "lessThan": "1.12.1-stable", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-40591", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T14:47:36.804026Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T15:19:33.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003c 1.12.1-stable" } ] } ], "descriptions": [ { "lang": "en", "value": "go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix is included in geth version `1.12.1-stable`, i.e, `1.12.2-unstable` and onwards. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-06T18:07:20.899Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm" }, { "name": "https://geth.ethereum.org/docs/developers/geth-developer/disclosures", "tags": [ "x_refsource_MISC" ], "url": "https://geth.ethereum.org/docs/developers/geth-developer/disclosures" }, { "name": "https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1" } ], "source": { "advisory": "GHSA-ppjg-v974-84cm", "discovery": "UNKNOWN" }, "title": "Denial of service via malicious p2p message in go-ethereum" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40591", "datePublished": "2023-09-06T18:07:20.899Z", "dateReserved": "2023-08-16T18:24:02.393Z", "dateUpdated": "2024-09-26T15:19:33.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26241
Vulnerability from cvelistv5
Published
2020-11-25 01:25
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. This is a Consensus vulnerability in Geth before version 1.9.17 which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. Geth's pre-compiled dataCopy (at 0x00...04) contract did a shallow copy on invocation. An attacker could deploy a contract that writes X to an EVM memory region R, then calls 0x00..04 with R as an argument, then overwrites R to Y, and finally invokes the RETURNDATACOPY opcode. When this contract is invoked, a consensus-compliant node would push X on the EVM stack, whereas Geth would push Y. This is fixed in version 1.9.17.
References
▼ | URL | Tags |
---|---|---|
https://blog.ethereum.org/2020/11/12/geth_security_release/ | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: >= 1.9.7, < 1.9.17 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:03.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003e= 1.9.7, \u003c 1.9.17" } ] } ], "descriptions": [ { "lang": "en", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. This is a Consensus vulnerability in Geth before version 1.9.17 which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. Geth\u0027s pre-compiled dataCopy (at 0x00...04) contract did a shallow copy on invocation. An attacker could deploy a contract that writes X to an EVM memory region R, then calls 0x00..04 with R as an argument, then overwrites R to Y, and finally invokes the RETURNDATACOPY opcode. When this contract is invoked, a consensus-compliant node would push X on the EVM stack, whereas Geth would push Y. This is fixed in version 1.9.17." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-682", "description": "CWE-682: Incorrect Calculation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-25T01:25:20", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf" } ], "source": { "advisory": "GHSA-69v6-xc2j-r2jf", "discovery": "UNKNOWN" }, "title": "Shallow copy bug in geth", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26241", "STATE": "PUBLIC", "TITLE": "Shallow copy bug in geth" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003e= 1.9.7, \u003c 1.9.17" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. This is a Consensus vulnerability in Geth before version 1.9.17 which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. Geth\u0027s pre-compiled dataCopy (at 0x00...04) contract did a shallow copy on invocation. An attacker could deploy a contract that writes X to an EVM memory region R, then calls 0x00..04 with R as an argument, then overwrites R to Y, and finally invokes the RETURNDATACOPY opcode. When this contract is invoked, a consensus-compliant node would push X on the EVM stack, whereas Geth would push Y. This is fixed in version 1.9.17." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-682: Incorrect Calculation" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.ethereum.org/2020/11/12/geth_security_release/", "refsource": "MISC", "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" }, { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf" } ] }, "source": { "advisory": "GHSA-69v6-xc2j-r2jf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26241", "datePublished": "2020-11-25T01:25:20", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:03.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26264
Vulnerability from cvelistv5
Published
2020-12-11 16:45
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q | x_refsource_CONFIRM | |
https://github.com/ethereum/go-ethereum/pull/21896 | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46 | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: < 1.9.25 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:04.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/pull/21896" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003c 1.9.25" } ] } ], "descriptions": [ { "lang": "en", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-11T16:45:24", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/pull/21896" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25" } ], "source": { "advisory": "GHSA-r33q-22hv-j29q", "discovery": "UNKNOWN" }, "title": "LES Server DoS via GetProofsV2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26264", "STATE": "PUBLIC", "TITLE": "LES Server DoS via GetProofsV2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003c 1.9.25" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q" }, { "name": "https://github.com/ethereum/go-ethereum/pull/21896", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/pull/21896" }, { "name": "https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46" }, { "name": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25" } ] }, "source": { "advisory": "GHSA-r33q-22hv-j29q", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26264", "datePublished": "2020-12-11T16:45:24", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:04.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29177
Vulnerability from cvelistv5
Published
2022-05-20 16:20
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-wjxw-gh3m-7pm5 | x_refsource_CONFIRM | |
https://github.com/ethereum/go-ethereum/pull/24507 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: < 1.10.17 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.050Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-wjxw-gh3m-7pm5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/pull/24507" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003c 1.10.17" } ] } ], "descriptions": [ { "lang": "en", "value": "Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-20T16:20:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-wjxw-gh3m-7pm5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/pull/24507" } ], "source": { "advisory": "GHSA-wjxw-gh3m-7pm5", "discovery": "UNKNOWN" }, "title": "DoS via malicious p2p message in Go-Ethereum", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-29177", "STATE": "PUBLIC", "TITLE": "DoS via malicious p2p message in Go-Ethereum" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003c 1.10.17" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-wjxw-gh3m-7pm5", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-wjxw-gh3m-7pm5" }, { "name": "https://github.com/ethereum/go-ethereum/pull/24507", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/pull/24507" } ] }, "source": { "advisory": "GHSA-wjxw-gh3m-7pm5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-29177", "datePublished": "2022-05-20T16:20:10", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:17:54.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26242
Vulnerability from cvelistv5
Published
2020-11-25 01:25
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.18, there is a Denial-of-service (crash) during block processing. This is fixed in 1.9.18.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m | x_refsource_CONFIRM | |
https://blog.ethereum.org/2020/11/12/geth_security_release/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: < 1.9.18 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:03.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003c 1.9.18" } ] } ], "descriptions": [ { "lang": "en", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.18, there is a Denial-of-service (crash) during block processing. This is fixed in 1.9.18." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-25T01:25:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" } ], "source": { "advisory": "GHSA-jm5c-rv3w-w83m", "discovery": "UNKNOWN" }, "title": "Denial of service in geth", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26242", "STATE": "PUBLIC", "TITLE": "Denial of service in geth" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003c 1.9.18" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.18, there is a Denial-of-service (crash) during block processing. This is fixed in 1.9.18." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m" }, { "name": "https://blog.ethereum.org/2020/11/12/geth_security_release/", "refsource": "MISC", "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" } ] }, "source": { "advisory": "GHSA-jm5c-rv3w-w83m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26242", "datePublished": "2020-11-25T01:25:15", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:03.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26240
Vulnerability from cvelistv5
Published
2020-11-25 01:25
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. This issue is fixed as of 1.9.24
References
▼ | URL | Tags |
---|---|---|
https://blog.ethereum.org/2020/11/12/geth_security_release/ | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p | x_refsource_CONFIRM | |
https://github.com/ethereum/go-ethereum/pull/21793 | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: < 1.9.24 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:04.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/pull/21793" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003c 1.9.24" } ] } ], "descriptions": [ { "lang": "en", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. This issue is fixed as of 1.9.24" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-682", "description": "CWE-682: Incorrect Calculation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-25T01:25:27", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/pull/21793" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0" } ], "source": { "advisory": "GHSA-v592-xf75-856p", "discovery": "UNKNOWN" }, "title": "Erroneous Proof of Work calculation in geth", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26240", "STATE": "PUBLIC", "TITLE": "Erroneous Proof of Work calculation in geth" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003c 1.9.24" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. This issue is fixed as of 1.9.24" } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-682: Incorrect Calculation" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.ethereum.org/2020/11/12/geth_security_release/", "refsource": "MISC", "url": "https://blog.ethereum.org/2020/11/12/geth_security_release/" }, { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p" }, { "name": "https://github.com/ethereum/go-ethereum/pull/21793", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/pull/21793" }, { "name": "https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0" } ] }, "source": { "advisory": "GHSA-v592-xf75-856p", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26240", "datePublished": "2020-11-25T01:25:27", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:04.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32972
Vulnerability from cvelistv5
Published
2024-05-06 14:26
Modified
2024-08-02 02:27
Severity ?
EPSS score ?
Summary
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to 1.13.15, a vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix has been included in geth version `1.13.15` and onwards.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652 | x_refsource_CONFIRM | |
https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: < 1.13.15 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ethereum:go_ethereum:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "go_ethereum", "vendor": "ethereum", "versions": [ { "lessThan": "1.13.15", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32972", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-09T19:07:59.118874Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:49.796Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652" }, { "name": "https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003c 1.13.15" } ] } ], "descriptions": [ { "lang": "en", "value": "go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to 1.13.15, a vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix has been included in geth version `1.13.15` and onwards." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-06T14:26:19.510Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652" }, { "name": "https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15" } ], "source": { "advisory": "GHSA-4xc9-8hmq-j652", "discovery": "UNKNOWN" }, "title": "go-ethereum denial of service via malicious p2p message" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32972", "datePublished": "2024-05-06T14:26:19.510Z", "dateReserved": "2024-04-22T15:14:59.165Z", "dateUpdated": "2024-08-02T02:27:53.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39137
Vulnerability from cvelistv5
Published
2021-08-24 16:05
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
go-ethereum is the official Go implementation of the Ethereum protocol. In affected versions a consensus-vulnerability in go-ethereum (Geth) could cause a chain split, where vulnerable versions refuse to accept the canonical chain. Further details about the vulnerability will be disclosed at a later date. A patch is included in the upcoming `v1.10.8` release. No workaround are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq | x_refsource_CONFIRM | |
https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: >= 1.10.0, < 1.10.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:17.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003e= 1.10.0, \u003c 1.10.8" } ] } ], "descriptions": [ { "lang": "en", "value": "go-ethereum is the official Go implementation of the Ethereum protocol. In affected versions a consensus-vulnerability in go-ethereum (Geth) could cause a chain split, where vulnerable versions refuse to accept the canonical chain. Further details about the vulnerability will be disclosed at a later date. A patch is included in the upcoming `v1.10.8` release. No workaround are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-436", "description": "CWE-436: Interpretation Conflict", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-24T16:05:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8" } ], "source": { "advisory": "GHSA-9856-9gg9-qcmq", "discovery": "UNKNOWN" }, "title": "Consensus flaw during block processing in go-ethereum", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39137", "STATE": "PUBLIC", "TITLE": "Consensus flaw during block processing in go-ethereum" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003e= 1.10.0, \u003c 1.10.8" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "go-ethereum is the official Go implementation of the Ethereum protocol. In affected versions a consensus-vulnerability in go-ethereum (Geth) could cause a chain split, where vulnerable versions refuse to accept the canonical chain. Further details about the vulnerability will be disclosed at a later date. A patch is included in the upcoming `v1.10.8` release. No workaround are available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-436: Interpretation Conflict" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-9856-9gg9-qcmq" }, { "name": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.8" } ] }, "source": { "advisory": "GHSA-9856-9gg9-qcmq", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39137", "datePublished": "2021-08-24T16:05:10", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:17.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26265
Vulnerability from cvelistv5
Published
2020-12-11 16:45
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4 | x_refsource_CONFIRM | |
https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: >= 1.9.4, < 1.9.20 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:03.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003e= 1.9.4, \u003c 1.9.20" } ] } ], "descriptions": [ { "lang": "en", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-682", "description": "CWE-682 Incorrect Calculation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-11T16:45:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20" } ], "source": { "advisory": "GHSA-xw37-57qp-9mm4", "discovery": "UNKNOWN" }, "title": "Consensus flaw during block processing", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26265", "STATE": "PUBLIC", "TITLE": "Consensus flaw during block processing" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003e= 1.9.4, \u003c 1.9.20" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go Ethereum, or \"Geth\", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-682 Incorrect Calculation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4" }, { "name": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20" } ] }, "source": { "advisory": "GHSA-xw37-57qp-9mm4", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26265", "datePublished": "2020-12-11T16:45:15", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:03.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41173
Vulnerability from cvelistv5
Published
2021-10-26 14:05
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.9, a vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer. Version v1.10.9 contains patches to the vulnerability. There are no known workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v | x_refsource_CONFIRM | |
https://github.com/ethereum/go-ethereum/pull/23801 | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738 | x_refsource_MISC | |
https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ethereum | go-ethereum |
Version: < 1.10.9 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/pull/23801" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "go-ethereum", "vendor": "ethereum", "versions": [ { "status": "affected", "version": "\u003c 1.10.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.9, a vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer. Version v1.10.9 contains patches to the vulnerability. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-26T14:05:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/pull/23801" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9" } ], "source": { "advisory": "GHSA-59hh-656j-3p7v", "discovery": "UNKNOWN" }, "title": "DoS via maliciously crafted p2p message ", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41173", "STATE": "PUBLIC", "TITLE": "DoS via maliciously crafted p2p message " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "go-ethereum", "version": { "version_data": [ { "version_value": "\u003c 1.10.9" } ] } } ] }, "vendor_name": "ethereum" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.9, a vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer. Version v1.10.9 contains patches to the vulnerability. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v", "refsource": "CONFIRM", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v" }, { "name": "https://github.com/ethereum/go-ethereum/pull/23801", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/pull/23801" }, { "name": "https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738" }, { "name": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9", "refsource": "MISC", "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9" } ] }, "source": { "advisory": "GHSA-59hh-656j-3p7v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41173", "datePublished": "2021-10-26T14:05:12", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }