bitcoind and Bitcoin-Qt prior to 0.15.1 have a stack-based buffer overflow if an attacker-controlled SOCKS proxy server is used. This results from an integer signedness error when the proxy server responds with an acknowledgement of an unexpected target domain name.
References
Link | Resource |
---|---|
https://medium.com/@lukedashjr/cve-2017-18350-disclosure-fe6d695f45d5 | Third Party Advisory |
https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures | Vendor Advisory |
Configurations
Information
Published : 2020-03-12 14:15
Updated : 2020-03-18 10:07
NVD link : CVE-2017-18350
Mitre link : CVE-2017-18350
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
bitcoin
- bitcoin_core