ghsa-ppjg-v974-84cm
Vulnerability from github
Published
2023-09-06 19:49
Modified
2023-11-08 17:39
Severity ?
Summary
Go-Ethereum vulnerable to denial of service via malicious p2p message
Details
Impact
A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node.
Details
The p2p handler spawned a new goroutine to respond to ping
requests. By flooding a node with ping requests, an unbounded number of goroutines can be created, leading to resource exhaustion and potentially crash due to OOM.
Patches
The fix is included in geth version 1.12.1-stable
, i.e, 1.12.2-unstable
and onwards.
Fixed by https://github.com/ethereum/go-ethereum/pull/27887
Workarounds
No known workarounds.
Credits
This bug was reported by Patrick McHardy and reported via bounty@ethereum.org.
References
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/ethereum/go-ethereum" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.12.1-stable" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-40591" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2023-09-06T19:49:46Z", "nvd_published_at": "2023-09-06T19:15:44Z", "severity": "HIGH" }, "details": "### Impact\n\nA vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node.\n\n### Details\n\nThe p2p handler spawned a new goroutine to respond to `ping` requests. By flooding a node with ping requests, an unbounded number of goroutines can be created, leading to resource exhaustion and potentially crash due to OOM.\n\n### Patches\n\nThe fix is included in geth version `1.12.1-stable`, i.e, `1.12.2-unstable` and onwards. \n\nFixed by https://github.com/ethereum/go-ethereum/pull/27887\n\n### Workarounds\n\nNo known workarounds. \n\n### Credits\n\nThis bug was reported by Patrick McHardy and reported via [bounty@ethereum.org](mailto:bounty@ethereum.org). \n\n### References\n\n", "id": "GHSA-ppjg-v974-84cm", "modified": "2023-11-08T17:39:39Z", "published": "2023-09-06T19:49:46Z", "references": [ { "type": "WEB", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40591" }, { "type": "WEB", "url": "https://geth.ethereum.org/docs/developers/geth-developer/disclosures" }, { "type": "PACKAGE", "url": "https://github.com/ethereum/go-ethereum" }, { "type": "WEB", "url": "https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "Go-Ethereum vulnerable to denial of service via malicious p2p message" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.