Vulnerabilities
Vulnerable Software
Ethereum:  >> Go Ethereum  Security Vulnerabilities
Go Ethereum (aka geth) 1.8.19 allows attackers to cause a denial of service (memory consumption) by rewriting the length of a dynamic array in memory, and then writing data to a single memory location with a large index number, as demonstrated by use of "assembly { mstore }" followed by a "c[0xC800000] = 0xFF" assignment.
CVSS Score
7.5
EPSS Score
0.003
Published
2018-12-24
cmd/evm/runner.go in Go Ethereum (aka geth) 1.8.17 allows attackers to cause a denial of service (SEGV) via crafted bytecode.
CVSS Score
7.5
EPSS Score
0.004
Published
2018-11-12
In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.
CVSS Score
7.5
EPSS Score
0.002
Published
2018-09-08
The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue.
CVSS Score
7.5
EPSS Score
0.122
Published
2018-07-05


Contact Us

Shodan ® - All rights reserved