DoS via malicious p2p message in Go Ethereum
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          May 11, 2022 
          in
          
            ethereum/go-ethereum
          
          •
          Updated Jan 27, 2023 
      
  
Package
Affected versions
< 1.10.17
  Patched versions
1.10.17
  Description
        Published by the National Vulnerability Database
      May 20, 2022 
    
  
        Published to the GitHub Advisory Database
      May 24, 2022 
    
  
        Reviewed
      May 24, 2022 
    
  
        Last updated
      Jan 27, 2023 
    
  
Impact
A vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node.
Patches
The following PR addresses the problem: ethereum/go-ethereum#24507
Workarounds
Aside from applying the PR linked above, setting loglevel to default level (
INFO) makes the node not vulnerable to this attack.Credits
This bug was reported by
nrvvia [email protected], who has gracefully requested that the bounty rewards be donated to Médecins sans frontières.For more information
If you have any questions or comments about this advisory:
References