DoS via malicious p2p message in Go Ethereum
Moderate severity
GitHub Reviewed
Published
May 11, 2022
in
ethereum/go-ethereum
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
May 20, 2022
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
May 24, 2022
Last updated
Jan 27, 2023
Impact
A vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node.
Patches
The following PR addresses the problem: ethereum/go-ethereum#24507
Workarounds
Aside from applying the PR linked above, setting loglevel to default level (
INFO
) makes the node not vulnerable to this attack.Credits
This bug was reported by
nrv
via [email protected], who has gracefully requested that the bounty rewards be donated to Médecins sans frontières.For more information
If you have any questions or comments about this advisory:
References