CVE-2022-23328

A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
References
Link Resource
http://go-ethereum.com Product
https://tristartom.github.io/docs/ccs21.pdf Exploit Mitigation Technical Description Third Party Advisory
http://ethereum.com Product
https://dl.acm.org/doi/pdf/10.1145/3460120.3485369 Exploit Mitigation Technical Description Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:ethereum:go_ethereum:-:*:*:*:*:*:*:*

Information

Published : 2022-03-04 04:15

Updated : 2022-03-17 08:39


NVD link : CVE-2022-23328

Mitre link : CVE-2022-23328


JSON object : View

CWE
CWE-400

Uncontrolled Resource Consumption

Advertisement

dedicated server usa

Products Affected

ethereum

  • go_ethereum