Lucene search

K
githubGitHub Advisory DatabaseGHSA-425C-CCF3-3JRR
HistoryNov 15, 2019 - 11:10 p.m.

Critical severity vulnerability that affects slpjs

2019-11-1523:10:35
CWE-20
GitHub Advisory Database
github.com
15

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:P/A:P

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

31.6%

Validator parsing discrepancy due to string encoding

Impact

A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus.

Patches

All versions > 0.21.3 are patched.

Workarounds

Upgrade to any version >= 0.21.4.

References

The bug was located and fixed here.

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
simpleledgerslpjsRange<0.21.4
CPENameOperatorVersion
slpjslt0.21.4

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:P/A:P

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

31.6%

Related for GHSA-425C-CCF3-3JRR