Lucene search

K
cve[email protected]CVE-2022-23486
HistoryDec 07, 2022 - 9:15 p.m.

CVE-2022-23486

2022-12-0721:15:10
CWE-770
CWE-400
web.nvd.nist.gov
57
cve-2022-23486
libp2p-rust
networking stack
dos vulnerability
memory allocation
security update

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.9%

libp2p-rust is the official rust language Implementation of the libp2p networking stack. In versions prior to 0.45.1 an attacker node can cause a victim node to allocate a large number of small memory chunks, which can ultimately lead to the victim’s process running out of memory and thus getting killed by its operating system. When executed continuously, this can lead to a denial of service attack, especially relevant on a larger scale when run against more than one node of a libp2p based network. Users are advised to upgrade to libp2p v0.45.1 or above. Users unable to upgrade should reference the DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor their application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.

Affected configurations

Vulners
NVD
Node
libp2plibp2pRange<0.45.1
VendorProductVersionCPE
libp2plibp2p*cpe:2.3:a:libp2p:libp2p:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "libp2p",
    "product": "rust-libp2p",
    "versions": [
      {
        "version": "< 0.45.1",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.9%

Related for CVE-2022-23486