A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
References
Link | Resource |
---|---|
http://go-ethereum.com | Product |
https://tristartom.github.io/docs/ccs21.pdf | Exploit Mitigation Technical Description Third Party Advisory |
http://ethereum.com | Product |
https://dl.acm.org/doi/pdf/10.1145/3460120.3485369 | Exploit Mitigation Technical Description Third Party Advisory |
Configurations
Information
Published : 2022-03-04 04:15
Updated : 2022-03-17 08:39
NVD link : CVE-2022-23328
Mitre link : CVE-2022-23328
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
ethereum
- go_ethereum