CloakCoin through 2.2.2.0 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk.
References
Link | Resource |
---|---|
https://medium.com/@dsl_uiuc/fake-stake-attacks-on-chain-based-proof-of-stake-cryptocurrencies-b8b05723f806 | Third Party Advisory |
http://fc19.ifca.ai/preproceedings/180-preproceedings.pdf | Third Party Advisory |
Configurations
Information
Published : 2019-11-05 13:15
Updated : 2019-11-06 08:42
NVD link : CVE-2018-19167
Mitre link : CVE-2018-19167
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
cloakcoin
- cloakcoin