Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-40591
HistorySep 06, 2023 - 6:07 p.m.

CVE-2023-40591 Denial of service via malicious p2p message in go-ethereum

2023-09-0618:07:20
CWE-400
GitHub_M
www.cve.org
denial of service
vulnerability
go-ethereum
p2p
malicious message
geth
ethereum protocol
memory consumption
attacker node
version upgrade

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.1%

go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix is included in geth version 1.12.1-stable, i.e, 1.12.2-unstable and onwards. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "ethereum",
    "product": "go-ethereum",
    "versions": [
      {
        "version": "< 1.12.1-stable",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.1%

Related for CVELIST:CVE-2023-40591