CVE-2022-23327

A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).
References
Link Resource
http://ethereum.com Broken Link Not Applicable
http://go-ethereum.com Broken Link
https://dl.acm.org/doi/pdf/10.1145/3460120.3485369 Exploit Mitigation Technical Description Third Party Advisory
https://tristartom.github.io/docs/ccs21.pdf Exploit Mitigation Technical Description Third Party Advisory
http://ethereum.com Broken Link Not Applicable
http://go-ethereum.com Broken Link
https://dl.acm.org/doi/pdf/10.1145/3460120.3485369 Exploit Mitigation Technical Description Third Party Advisory
https://tristartom.github.io/docs/ccs21.pdf Exploit Mitigation Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:48

Type Values Removed Values Added
References () http://ethereum.com - Broken Link, Not Applicable () http://ethereum.com - Broken Link, Not Applicable
References () http://go-ethereum.com - Broken Link () http://go-ethereum.com - Broken Link
References () https://dl.acm.org/doi/pdf/10.1145/3460120.3485369 - Exploit, Mitigation, Technical Description, Third Party Advisory () https://dl.acm.org/doi/pdf/10.1145/3460120.3485369 - Exploit, Mitigation, Technical Description, Third Party Advisory
References () https://tristartom.github.io/docs/ccs21.pdf - Exploit, Mitigation, Technical Description, Third Party Advisory () https://tristartom.github.io/docs/ccs21.pdf - Exploit, Mitigation, Technical Description, Third Party Advisory

Information

Published : 2022-03-04 12:15

Updated : 2024-11-21 06:48


NVD link : CVE-2022-23327

Mitre link : CVE-2022-23327

CVE.ORG link : CVE-2022-23327


JSON object : View

Products Affected

ethereum

  • go_ethereum