Vulnerabilites related to bitcoin - bitcoin-qt
CVE-2013-5700 (GCVE-0-2013-5700)
Vulnerability from cvelistv5
Published
2013-09-10 10:00
Modified
2024-09-16 19:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Bloom Filter implementation in bitcoind and Bitcoin-Qt 0.8.x before 0.8.4rc1 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted sequence of messages.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:22:29.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcointalk.org/index.php?topic=287351" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bloom Filter implementation in bitcoind and Bitcoin-Qt 0.8.x before 0.8.4rc1 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted sequence of messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-10T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcointalk.org/index.php?topic=287351" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5700", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Bloom Filter implementation in bitcoind and Bitcoin-Qt 0.8.x before 0.8.4rc1 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted sequence of messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "name": "https://bitcointalk.org/index.php?topic=287351", "refsource": "CONFIRM", "url": "https://bitcointalk.org/index.php?topic=287351" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-5700", "datePublished": "2013-09-10T10:00:00Z", "dateReserved": "2013-09-05T00:00:00Z", "dateUpdated": "2024-09-16T19:55:45.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2292 (GCVE-0-2013-2292)
Vulnerability from cvelistv5
Published
2013-03-12 10:00
Modified
2024-09-16 18:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:36:44.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVEs" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcointalk.org/?topic=140078" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-12T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVEs" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcointalk.org/?topic=140078" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://en.bitcoin.it/wiki/CVEs", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "name": "https://bitcointalk.org/?topic=140078", "refsource": "CONFIRM", "url": "https://bitcointalk.org/?topic=140078" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2292", "datePublished": "2013-03-12T10:00:00Z", "dateReserved": "2013-02-28T00:00:00Z", "dateUpdated": "2024-09-16T18:29:52.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1910 (GCVE-0-2012-1910)
Vulnerability from cvelistv5
Published
2012-08-06 16:00
Modified
2024-09-16 23:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Bitcoin-Qt 0.5.0.x before 0.5.0.5; 0.5.1.x, 0.5.2.x, and 0.5.3.x before 0.5.3.1; and 0.6.x before 0.6.0rc4 on Windows does not use MinGW multithread-safe exception handling, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted Bitcoin protocol messages.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcointalk.org/index.php?topic=69120.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Bitcoin-Qt 0.5.0.x before 0.5.0.5; 0.5.1.x, 0.5.2.x, and 0.5.3.x before 0.5.3.1; and 0.6.x before 0.6.0rc4 on Windows does not use MinGW multithread-safe exception handling, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted Bitcoin protocol messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-06T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcointalk.org/index.php?topic=69120.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bitcoin-Qt 0.5.0.x before 0.5.0.5; 0.5.1.x, 0.5.2.x, and 0.5.3.x before 0.5.3.1; and 0.6.x before 0.6.0rc4 on Windows does not use MinGW multithread-safe exception handling, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted Bitcoin protocol messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831", "refsource": "CONFIRM", "url": "https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831" }, { "name": "https://bitcointalk.org/index.php?topic=69120.0", "refsource": "CONFIRM", "url": "https://bitcointalk.org/index.php?topic=69120.0" }, { "name": "http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html", "refsource": "CONFIRM", "url": "http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html" }, { "name": "https://en.bitcoin.it/wiki/CVEs", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVEs" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1910", "datePublished": "2012-08-06T16:00:00Z", "dateReserved": "2012-03-26T00:00:00Z", "dateUpdated": "2024-09-16T23:16:22.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-3220 (GCVE-0-2013-3220)
Vulnerability from cvelistv5
Published
2013-08-01 16:00
Modified
2024-09-16 22:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
bitcoind and Bitcoin-Qt before 0.4.9rc2, 0.5.x before 0.5.8rc2, 0.6.x before 0.6.5rc2, and 0.7.x before 0.7.3rc2, and wxBitcoin, do not properly consider whether a block's size could require an excessive number of database locks, which allows remote attackers to cause a denial of service (split) and enable certain double-spending capabilities via a large block that triggers incorrect Berkeley DB locking.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:00:10.141Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/BIP_0050" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "bitcoind and Bitcoin-Qt before 0.4.9rc2, 0.5.x before 0.5.8rc2, 0.6.x before 0.6.5rc2, and 0.7.x before 0.7.3rc2, and wxBitcoin, do not properly consider whether a block\u0027s size could require an excessive number of database locks, which allows remote attackers to cause a denial of service (split) and enable certain double-spending capabilities via a large block that triggers incorrect Berkeley DB locking." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-01T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/BIP_0050" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "bitcoind and Bitcoin-Qt before 0.4.9rc2, 0.5.x before 0.5.8rc2, 0.6.x before 0.6.5rc2, and 0.7.x before 0.7.3rc2, and wxBitcoin, do not properly consider whether a block\u0027s size could require an excessive number of database locks, which allows remote attackers to cause a denial of service (split) and enable certain double-spending capabilities via a large block that triggers incorrect Berkeley DB locking." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "name": "https://en.bitcoin.it/wiki/BIP_0050", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/BIP_0050" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3220", "datePublished": "2013-08-01T16:00:00Z", "dateReserved": "2013-04-20T00:00:00Z", "dateUpdated": "2024-09-16T22:24:42.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2273 (GCVE-0-2013-2273)
Vulnerability from cvelistv5
Published
2013-03-12 10:00
Modified
2024-09-16 23:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.125Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-12T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2273", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://en.bitcoin.it/wiki/CVEs", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVEs" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2273", "datePublished": "2013-03-12T10:00:00Z", "dateReserved": "2013-02-26T00:00:00Z", "dateUpdated": "2024-09-16T23:40:26.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4684 (GCVE-0-2012-4684)
Vulnerability from cvelistv5
Published
2013-03-12 10:00
Modified
2024-09-16 20:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:54.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVE-2012-4684" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVEs" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcointalk.org/index.php?topic=8392.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcointalk.org/index.php?topic=148109.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-12T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVE-2012-4684" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVEs" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcointalk.org/index.php?topic=8392.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcointalk.org/index.php?topic=148109.0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4684", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://en.bitcoin.it/wiki/CVE-2012-4684", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVE-2012-4684" }, { "name": "https://en.bitcoin.it/wiki/CVEs", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "name": "https://bitcointalk.org/index.php?topic=8392.0", "refsource": "CONFIRM", "url": "https://bitcointalk.org/index.php?topic=8392.0" }, { "name": "https://bitcointalk.org/index.php?topic=148109.0", "refsource": "CONFIRM", "url": "https://bitcointalk.org/index.php?topic=148109.0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4684", "datePublished": "2013-03-12T10:00:00Z", "dateReserved": "2012-08-28T00:00:00Z", "dateUpdated": "2024-09-16T20:36:40.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2272 (GCVE-0-2013-2272)
Vulnerability from cvelistv5
Published
2013-03-12 10:00
Modified
2024-09-16 23:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcointalk.org/?topic=135856" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-12T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcointalk.org/?topic=135856" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bitcointalk.org/?topic=135856", "refsource": "CONFIRM", "url": "https://bitcointalk.org/?topic=135856" }, { "name": "https://en.bitcoin.it/wiki/CVEs", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVEs" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2272", "datePublished": "2013-03-12T10:00:00Z", "dateReserved": "2013-02-26T00:00:00Z", "dateUpdated": "2024-09-16T23:05:38.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2293 (GCVE-0-2013-2293)
Vulnerability from cvelistv5
Published
2013-03-12 10:00
Modified
2024-09-16 17:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:36:44.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVE-2013-2293" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcointalk.org/?topic=144122" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-03-12T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVE-2013-2293" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcointalk.org/?topic=144122" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2293", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://en.bitcoin.it/wiki/CVE-2013-2293", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVE-2013-2293" }, { "name": "https://bitcointalk.org/?topic=144122", "refsource": "CONFIRM", "url": "https://bitcointalk.org/?topic=144122" }, { "name": "https://en.bitcoin.it/wiki/CVEs", "refsource": "CONFIRM", "url": "https://en.bitcoin.it/wiki/CVEs" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2293", "datePublished": "2013-03-12T10:00:00Z", "dateReserved": "2013-02-28T00:00:00Z", "dateUpdated": "2024-09-16T17:33:18.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-10724 (GCVE-0-2016-10724)
Vulnerability from cvelistv5
Published
2018-07-05 22:00
Modified
2024-08-06 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:30:20.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/JinBean/CVE-Extension" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-07-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-17T18:45:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/JinBean/CVE-Extension" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-10724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html", "refsource": "MISC", "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "name": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures", "refsource": "MISC", "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "name": "https://github.com/JinBean/CVE-Extension", "refsource": "MISC", "url": "https://github.com/JinBean/CVE-Extension" }, { "name": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure", "refsource": "CONFIRM", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10724", "datePublished": "2018-07-05T22:00:00", "dateReserved": "2018-06-24T00:00:00", "dateUpdated": "2024-08-06T03:30:20.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-10725 (GCVE-0-2016-10725)
Vulnerability from cvelistv5
Published
2018-07-05 22:00
Modified
2024-08-06 03:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Bitcoin Core before v0.13.0, a non-final alert is able to block the special "final alert" (which is supposed to override all other alerts) because operations occur in the wrong order. This behavior occurs in the remote network alert system (deprecated since Q1 2016). This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:30:20.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/JinBean/CVE-Extension" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-07-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In Bitcoin Core before v0.13.0, a non-final alert is able to block the special \"final alert\" (which is supposed to override all other alerts) because operations occur in the wrong order. This behavior occurs in the remote network alert system (deprecated since Q1 2016). This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-17T18:51:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/JinBean/CVE-Extension" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-10725", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Bitcoin Core before v0.13.0, a non-final alert is able to block the special \"final alert\" (which is supposed to override all other alerts) because operations occur in the wrong order. This behavior occurs in the remote network alert system (deprecated since Q1 2016). This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html", "refsource": "MISC", "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "name": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures", "refsource": "MISC", "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "name": "https://github.com/JinBean/CVE-Extension", "refsource": "MISC", "url": "https://github.com/JinBean/CVE-Extension" }, { "name": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure", "refsource": "CONFIRM", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10725", "datePublished": "2018-07-05T22:00:00", "dateReserved": "2018-06-25T00:00:00", "dateUpdated": "2024-08-06T03:30:20.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-03-12 11:28
Modified
2025-04-11 00:51
Severity ?
Summary
bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "107C630C-68AD-478B-9206-403CCEAE9B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4.8:rc4:*:*:*:*:*:*", "matchCriteriaId": "F567F467-E340-4BBA-9D42-DC3445EE09DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "27CD6BDE-3732-4863-B855-A0FD022DD62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "20635DAC-54CF-48C4-979A-7E909A985093", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "0264EBF9-C104-49C5-9F43-E0CCC73154B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2233FD0-6F87-4B8B-BDC9-C633F428BA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "80FA08FC-3D57-467B-838B-FDF1E67BF609", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "1DB1A621-F271-4120-A642-CAC3D09232AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D758886-F560-4FF6-88DA-C5EEBAACA20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F473942D-1B5B-4348-9896-9828976A3C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A56DE917-D389-4D60-8586-D4F1DEB9012A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "32A19BEA-853D-4727-B456-FCBAFF36CDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "D009847B-E8E7-4472-8260-4A334438C587", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EBE93-A104-407F-A615-E64F65777CC4", "versionEndIncluding": "0.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1CD19345-15B5-4B2F-B3B9-4D57CCBFFF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F0499EA1-85AD-48EC-A8D0-CBEDB85429AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "61F25360-9436-41C9-82CB-39D7FF087C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "83F460DD-E537-430D-A370-485E0A707560", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9264DE-6336-4654-8E8A-A3725B845D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "B7A0874D-2223-4577-A8E6-93455B9C1DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C15FA7C-F87A-45F5-B6A3-5E2DA63AACB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6B138-0ED9-4205-B544-66C4C60C3A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "8494FF99-5D8C-497A-90E7-3D87807F5997", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03E74F91-82C2-435C-BB20-3FF25E431B4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4596F85F-66DA-46DB-BF7B-BB1C01E0B67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "63681DB5-2644-476C-86AD-D7DCD69AE1FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "42BE2305-B58F-4D12-80B1-AF0BF29E15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4FEB8A5B-52A4-4D67-8472-46399998C4E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "AACA3639-4F17-4E4E-BBFF-23D6252DDB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "148CF2B0-2C70-47B9-9547-382AE458DCFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:rc:*:*:*:*:*:*", "matchCriteriaId": "74398A03-74B4-4EC4-A15E-047367614EC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AF597D-8BBD-44FE-B0C9-8B03B0350F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBEC9080-8DE2-4E55-AC46-AE9D42AC174D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EAA8B1F0-BC5C-4358-9A0A-3753E8566BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4381211-305A-4FAD-BD0F-56513F153958", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AA1D165-3E63-4B9F-AC17-CCDD2BEF5E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D079E05-C980-4257-9B39-D0750BF318D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3013254-B002-4F67-B6A0-747F9F82250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6312FFC8-EF3F-4B74-8000-080C3FBA1AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "27283E3F-E88A-45ED-8BFA-C9C6A09EA642", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "73BE7AA5-D1A4-4F2E-9D97-9649E6F42B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B99F940E-EF59-4150-B980-0C70DC5995DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9F5744C1-16A1-4617-B3D0-90305DD0C145", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B323C69A-C343-4FF3-BA70-2449A9083907", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8BA3817C-4DC0-4867-8DD9-7B912602C80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AAD1B466-3E8D-4179-8AEE-07E51B04D396", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.4.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "CC730AD6-2B5B-47A2-881E-B543ABD77AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "0430A512-206A-4143-AC5F-C3E0AF19AD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E0AB1-DE49-46EA-AF18-FA9D053E2DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "D29BF4F1-A79D-4AED-8D1A-59C58093F621", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "57E4D76A-A84C-49F5-BDED-F64BB4C49972", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "3E64AEBF-988A-476E-9275-8B42C66F7101", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D062707E-A0FC-4A89-A59B-D68EFAFA8683", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9979189E-737C-48F1-BBB3-2E878EC4D4D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "416E87CB-03CC-4C72-9A41-CEE09A8A4FAD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes." }, { "lang": "es", "value": "Bitcoind y Bitcoin-Qt v0.8.0 y anteriores permiten a atacantes remotos provocar una denegaci\u00f3n de servicio por minar un bloque para crear una transacci\u00f3n Bitcoin no est\u00e1ndar opcodes OP_CHECKSIG." } ], "id": "CVE-2013-2292", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-12T11:28:18.373", "references": [ { "source": "cve@mitre.org", "url": "https://bitcointalk.org/?topic=140078" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/CVEs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcointalk.org/?topic=140078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/CVEs" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-12 11:28
Modified
2025-04-11 00:51
Severity ?
Summary
The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D758886-F560-4FF6-88DA-C5EEBAACA20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1CD19345-15B5-4B2F-B3B9-4D57CCBFFF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F0499EA1-85AD-48EC-A8D0-CBEDB85429AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "61F25360-9436-41C9-82CB-39D7FF087C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "83F460DD-E537-430D-A370-485E0A707560", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9264DE-6336-4654-8E8A-A3725B845D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "B7A0874D-2223-4577-A8E6-93455B9C1DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C15FA7C-F87A-45F5-B6A3-5E2DA63AACB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6B138-0ED9-4205-B544-66C4C60C3A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "8494FF99-5D8C-497A-90E7-3D87807F5997", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03E74F91-82C2-435C-BB20-3FF25E431B4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4596F85F-66DA-46DB-BF7B-BB1C01E0B67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "63681DB5-2644-476C-86AD-D7DCD69AE1FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "42BE2305-B58F-4D12-80B1-AF0BF29E15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4FEB8A5B-52A4-4D67-8472-46399998C4E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "AACA3639-4F17-4E4E-BBFF-23D6252DDB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "148CF2B0-2C70-47B9-9547-382AE458DCFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:rc:*:*:*:*:*:*", "matchCriteriaId": "74398A03-74B4-4EC4-A15E-047367614EC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AF597D-8BBD-44FE-B0C9-8B03B0350F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBEC9080-8DE2-4E55-AC46-AE9D42AC174D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EAA8B1F0-BC5C-4358-9A0A-3753E8566BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4381211-305A-4FAD-BD0F-56513F153958", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AA1D165-3E63-4B9F-AC17-CCDD2BEF5E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D079E05-C980-4257-9B39-D0750BF318D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3013254-B002-4F67-B6A0-747F9F82250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6312FFC8-EF3F-4B74-8000-080C3FBA1AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "27283E3F-E88A-45ED-8BFA-C9C6A09EA642", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "73BE7AA5-D1A4-4F2E-9D97-9649E6F42B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B99F940E-EF59-4150-B980-0C70DC5995DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9F5744C1-16A1-4617-B3D0-90305DD0C145", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B323C69A-C343-4FF3-BA70-2449A9083907", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8BA3817C-4DC0-4867-8DD9-7B912602C80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AAD1B466-3E8D-4179-8AEE-07E51B04D396", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "57E4D76A-A84C-49F5-BDED-F64BB4C49972", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "112B0DB9-99BC-42A7-9991-92E73462701E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "75F6B20E-2957-4CCE-B9A4-692A4342BC67", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "DC9C5F2E-EFD7-4F92-BD58-91F9AFB0B15E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "5665049D-5326-496F-82B9-FD65808F934B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "1DDD2B05-34F6-4C5F-9443-FE67F9B86113", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B766B4-C3FD-42D8-9F7D-767B9C0C20F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7403B4E-912F-40F0-978C-C7D59AC92CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.4.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "87FCC078-AAF9-4FB4-B46E-EEE5D8488B81", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:wxbitcoin:0.5.0:rc:*:*:*:*:*:*", "matchCriteriaId": "C6A8CB89-F0A1-4E97-A053-CACC378BD8C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert." }, { "lang": "es", "value": "La funcionalidad Alert en bitcoind y Bitcoin-Qt anterior a v0.7.0 soporta diferentes representaciones de caract\u00e9res de la misma firma de datos, pero depende del hash de esta firma, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de una firma v\u00e1lida modificada para una alerta circulante." } ], "id": "CVE-2012-4684", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-12T11:28:18.313", "references": [ { "source": "cve@mitre.org", "url": "https://bitcointalk.org/index.php?topic=148109.0" }, { "source": "cve@mitre.org", "url": "https://bitcointalk.org/index.php?topic=8392.0" }, { "source": "cve@mitre.org", "url": "https://en.bitcoin.it/wiki/CVE-2012-4684" }, { "source": "cve@mitre.org", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcointalk.org/index.php?topic=148109.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcointalk.org/index.php?topic=8392.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://en.bitcoin.it/wiki/CVE-2012-4684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://en.bitcoin.it/wiki/CVEs" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-12 11:28
Modified
2025-04-11 00:51
Severity ?
Summary
The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:*:rc4:*:*:*:*:*:*", "matchCriteriaId": "E080E161-2DAC-4C34-8398-DDD146506DB8", "versionEndIncluding": "0.4.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "107C630C-68AD-478B-9206-403CCEAE9B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "27CD6BDE-3732-4863-B855-A0FD022DD62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "20635DAC-54CF-48C4-979A-7E909A985093", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "0264EBF9-C104-49C5-9F43-E0CCC73154B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2233FD0-6F87-4B8B-BDC9-C633F428BA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "80FA08FC-3D57-467B-838B-FDF1E67BF609", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "1DB1A621-F271-4120-A642-CAC3D09232AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D758886-F560-4FF6-88DA-C5EEBAACA20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F473942D-1B5B-4348-9896-9828976A3C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A56DE917-D389-4D60-8586-D4F1DEB9012A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "32A19BEA-853D-4727-B456-FCBAFF36CDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "D009847B-E8E7-4472-8260-4A334438C587", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1CD19345-15B5-4B2F-B3B9-4D57CCBFFF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F0499EA1-85AD-48EC-A8D0-CBEDB85429AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "61F25360-9436-41C9-82CB-39D7FF087C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "83F460DD-E537-430D-A370-485E0A707560", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9264DE-6336-4654-8E8A-A3725B845D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "B7A0874D-2223-4577-A8E6-93455B9C1DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C15FA7C-F87A-45F5-B6A3-5E2DA63AACB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6B138-0ED9-4205-B544-66C4C60C3A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "8494FF99-5D8C-497A-90E7-3D87807F5997", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03E74F91-82C2-435C-BB20-3FF25E431B4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4596F85F-66DA-46DB-BF7B-BB1C01E0B67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "63681DB5-2644-476C-86AD-D7DCD69AE1FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "42BE2305-B58F-4D12-80B1-AF0BF29E15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4FEB8A5B-52A4-4D67-8472-46399998C4E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "AACA3639-4F17-4E4E-BBFF-23D6252DDB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "148CF2B0-2C70-47B9-9547-382AE458DCFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:rc:*:*:*:*:*:*", "matchCriteriaId": "74398A03-74B4-4EC4-A15E-047367614EC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AF597D-8BBD-44FE-B0C9-8B03B0350F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBEC9080-8DE2-4E55-AC46-AE9D42AC174D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EAA8B1F0-BC5C-4358-9A0A-3753E8566BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4381211-305A-4FAD-BD0F-56513F153958", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AA1D165-3E63-4B9F-AC17-CCDD2BEF5E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D079E05-C980-4257-9B39-D0750BF318D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3013254-B002-4F67-B6A0-747F9F82250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6312FFC8-EF3F-4B74-8000-080C3FBA1AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "27283E3F-E88A-45ED-8BFA-C9C6A09EA642", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "73BE7AA5-D1A4-4F2E-9D97-9649E6F42B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B99F940E-EF59-4150-B980-0C70DC5995DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9F5744C1-16A1-4617-B3D0-90305DD0C145", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B323C69A-C343-4FF3-BA70-2449A9083907", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8BA3817C-4DC0-4867-8DD9-7B912602C80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AAD1B466-3E8D-4179-8AEE-07E51B04D396", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:*:rc4:*:*:*:*:*:*", "matchCriteriaId": "F0EC3A7C-D203-459E-8F03-3E0E859CB7FE", "versionEndIncluding": "0.4.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "0430A512-206A-4143-AC5F-C3E0AF19AD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E0AB1-DE49-46EA-AF18-FA9D053E2DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "D29BF4F1-A79D-4AED-8D1A-59C58093F621", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "57E4D76A-A84C-49F5-BDED-F64BB4C49972", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "3E64AEBF-988A-476E-9275-8B42C66F7101", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D062707E-A0FC-4A89-A59B-D68EFAFA8683", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9979189E-737C-48F1-BBB3-2E878EC4D4D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "416E87CB-03CC-4C72-9A41-CEE09A8A4FAD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees." }, { "lang": "es", "value": "El mecanismo de protecci\u00f3n \"penny-flooding\" en el m\u00e9todo CTxMemPool::accept en bitcoind and Bitcoin-Qt before v0.4.9rc1, v0.5.x anterior a v0.5.8rc1, v0.6.0 anterior a v0.6.0.11rc1, v0.6.1 hasta v0.6.5 anterior a v0.6.5rc1, y v0.7.x anterior a v0.7.3rc1 permite a atacantes remotos determinar asociaciones entre \"wallet addresses\" y direcciones IP mediante una serie de transacciones Bitcoin con insuficientes tasas." } ], "id": "CVE-2013-2272", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-12T11:28:18.337", "references": [ { "source": "cve@mitre.org", "url": "https://bitcointalk.org/?topic=135856" }, { "source": "cve@mitre.org", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcointalk.org/?topic=135856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://en.bitcoin.it/wiki/CVEs" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-08-02 12:10
Modified
2025-04-11 00:51
Severity ?
Summary
bitcoind and Bitcoin-Qt before 0.4.9rc2, 0.5.x before 0.5.8rc2, 0.6.x before 0.6.5rc2, and 0.7.x before 0.7.3rc2, and wxBitcoin, do not properly consider whether a block's size could require an excessive number of database locks, which allows remote attackers to cause a denial of service (split) and enable certain double-spending capabilities via a large block that triggers incorrect Berkeley DB locking.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:*:rc1:*:*:*:*:*:*", "matchCriteriaId": "46FD5DD3-6418-4437-95E0-9B0069257421", "versionEndIncluding": "0.4.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "107C630C-68AD-478B-9206-403CCEAE9B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4.8:rc4:*:*:*:*:*:*", "matchCriteriaId": "F567F467-E340-4BBA-9D42-DC3445EE09DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "27CD6BDE-3732-4863-B855-A0FD022DD62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "20635DAC-54CF-48C4-979A-7E909A985093", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "0264EBF9-C104-49C5-9F43-E0CCC73154B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2233FD0-6F87-4B8B-BDC9-C633F428BA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "80FA08FC-3D57-467B-838B-FDF1E67BF609", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "8D8F8107-6BB7-4C66-A0EC-58AAF841BE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "1DB1A621-F271-4120-A642-CAC3D09232AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D758886-F560-4FF6-88DA-C5EEBAACA20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F473942D-1B5B-4348-9896-9828976A3C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A56DE917-D389-4D60-8586-D4F1DEB9012A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "32A19BEA-853D-4727-B456-FCBAFF36CDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "E741E2B4-6CEE-4C5A-9950-CA8F5A6610DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "D009847B-E8E7-4472-8260-4A334438C587", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1CD19345-15B5-4B2F-B3B9-4D57CCBFFF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F0499EA1-85AD-48EC-A8D0-CBEDB85429AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "61F25360-9436-41C9-82CB-39D7FF087C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "83F460DD-E537-430D-A370-485E0A707560", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9264DE-6336-4654-8E8A-A3725B845D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "B7A0874D-2223-4577-A8E6-93455B9C1DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C15FA7C-F87A-45F5-B6A3-5E2DA63AACB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6B138-0ED9-4205-B544-66C4C60C3A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "8494FF99-5D8C-497A-90E7-3D87807F5997", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03E74F91-82C2-435C-BB20-3FF25E431B4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4596F85F-66DA-46DB-BF7B-BB1C01E0B67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "63681DB5-2644-476C-86AD-D7DCD69AE1FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "42BE2305-B58F-4D12-80B1-AF0BF29E15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4FEB8A5B-52A4-4D67-8472-46399998C4E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "AACA3639-4F17-4E4E-BBFF-23D6252DDB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "148CF2B0-2C70-47B9-9547-382AE458DCFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:rc:*:*:*:*:*:*", "matchCriteriaId": "74398A03-74B4-4EC4-A15E-047367614EC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AF597D-8BBD-44FE-B0C9-8B03B0350F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBEC9080-8DE2-4E55-AC46-AE9D42AC174D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EAA8B1F0-BC5C-4358-9A0A-3753E8566BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4381211-305A-4FAD-BD0F-56513F153958", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AA1D165-3E63-4B9F-AC17-CCDD2BEF5E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D079E05-C980-4257-9B39-D0750BF318D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3013254-B002-4F67-B6A0-747F9F82250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6312FFC8-EF3F-4B74-8000-080C3FBA1AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "27283E3F-E88A-45ED-8BFA-C9C6A09EA642", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "73BE7AA5-D1A4-4F2E-9D97-9649E6F42B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B99F940E-EF59-4150-B980-0C70DC5995DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9F5744C1-16A1-4617-B3D0-90305DD0C145", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B323C69A-C343-4FF3-BA70-2449A9083907", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8BA3817C-4DC0-4867-8DD9-7B912602C80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AAD1B466-3E8D-4179-8AEE-07E51B04D396", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:*:rc1:*:*:*:*:*:*", "matchCriteriaId": "EF7AA2D5-4829-4295-8C77-C772665C77E9", "versionEndIncluding": "0.4.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.4.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "CC730AD6-2B5B-47A2-881E-B543ABD77AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "0430A512-206A-4143-AC5F-C3E0AF19AD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.5.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "79ECD758-D902-4AD0-8752-AF7F1EDD0F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E0AB1-DE49-46EA-AF18-FA9D053E2DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "D29BF4F1-A79D-4AED-8D1A-59C58093F621", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "57E4D76A-A84C-49F5-BDED-F64BB4C49972", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "3E64AEBF-988A-476E-9275-8B42C66F7101", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "F43E2D53-0126-44D2-A294-3F40E54493CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D062707E-A0FC-4A89-A59B-D68EFAFA8683", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9979189E-737C-48F1-BBB3-2E878EC4D4D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "416E87CB-03CC-4C72-9A41-CEE09A8A4FAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "B586D352-78D7-43D3-91A9-3803E69CA63F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:qitcoin-qt:0.6.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "9BC7C187-CD39-4792-AFC6-41E270C0D228", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:qitcoin-qt:0.6.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "51F6C875-C053-4E86-81D4-630135E8BACA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "bitcoind and Bitcoin-Qt before 0.4.9rc2, 0.5.x before 0.5.8rc2, 0.6.x before 0.6.5rc2, and 0.7.x before 0.7.3rc2, and wxBitcoin, do not properly consider whether a block\u0027s size could require an excessive number of database locks, which allows remote attackers to cause a denial of service (split) and enable certain double-spending capabilities via a large block that triggers incorrect Berkeley DB locking." }, { "lang": "es", "value": "bitcoind y Bitcoin-Qt anterior a 0.4.9rc2, 0.5.x anterior a 0.5.8rc2, 0.6.x anterior a 0.6.5rc2, y 0.7.x anterior a 0.7.3rc2, y wxBitcoin, no consideran adecuadamente si un tama\u00f1o de bloque podr\u00eda necesitar un n\u00famero elevado de cierres en las base de datos, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (divisi\u00f3n) y activar capacidades de \"double-spending\" a trav\u00e9s de un gran bloque que provoca un cierre incorrecto de Berkeley DB." } ], "id": "CVE-2013-3220", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-08-02T12:10:40.467", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/BIP_0050" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/BIP_0050" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-06 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
Bitcoin-Qt 0.5.0.x before 0.5.0.5; 0.5.1.x, 0.5.2.x, and 0.5.3.x before 0.5.3.1; and 0.6.x before 0.6.0rc4 on Windows does not use MinGW multithread-safe exception handling, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted Bitcoin protocol messages.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bitcoin | bitcoin-qt | 0.5.0 | |
bitcoin | bitcoin-qt | 0.5.0.4 | |
bitcoin | bitcoin-qt | 0.5.1 | |
bitcoin | bitcoin-qt | 0.5.3.0 | |
bitcoin | bitcoin_core | 0.5.0 | |
bitcoin | bitcoin_core | 0.5.1 | |
bitcoin | bitcoin_core | 0.5.2 | |
bitcoin | bitcoin_core | 0.6.0 | |
bitcoin | bitcoin_core | 0.6.0 | |
bitcoin | bitcoin_core | 0.6.0 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "27CD6BDE-3732-4863-B855-A0FD022DD62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "20635DAC-54CF-48C4-979A-7E909A985093", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "0264EBF9-C104-49C5-9F43-E0CCC73154B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2233FD0-6F87-4B8B-BDC9-C633F428BA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B27520D-C703-4A15-8C8E-A6250C468ED2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B4715C1-22BF-495B-BA99-B4D7D64B5BD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D7E79FF3-C56B-4A19-8AE3-4DDA64AC7BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EDE5CA7E-C9F2-47ED-9F89-32AC8D664824", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A292912B-A5F1-4F90-81E6-0A3CA69166D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7F27334D-1CD6-4002-A5E4-9DA9F21E6FF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bitcoin-Qt 0.5.0.x before 0.5.0.5; 0.5.1.x, 0.5.2.x, and 0.5.3.x before 0.5.3.1; and 0.6.x before 0.6.0rc4 on Windows does not use MinGW multithread-safe exception handling, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted Bitcoin protocol messages." }, { "lang": "es", "value": "Bitcoin-Qt 0.5.0.x anterior a 0.5.0.5; 0.5.1.x, 0.5.2.x, y 0.5.3.x anterior a 0.5.3.1; y 0.6.x anterior a 0.6.0rc4 sobre Windows no utiliza ning\u00fan manejador de excepciones MinGW multithread-safe, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente la ejecuci\u00f3n arbitrario de c\u00f3digo a trav\u00e9s de mensajes del protocolo de Bitcoin." } ], "id": "CVE-2012-1910", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-06T16:55:01.773", "references": [ { "source": "cve@mitre.org", "url": "http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html" }, { "source": "cve@mitre.org", "url": "https://bitcointalk.org/index.php?topic=69120.0" }, { "source": "cve@mitre.org", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcointalk.org/index.php?topic=69120.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-05 22:29
Modified
2024-11-21 02:44
Severity ?
Summary
In Bitcoin Core before v0.13.0, a non-final alert is able to block the special "final alert" (which is supposed to override all other alerts) because operations occur in the wrong order. This behavior occurs in the remote network alert system (deprecated since Q1 2016). This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bitcoin | bitcoin_core | * | |
bitcoin | bitcoin-qt | * | |
bitcoin | bitcoind | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "C55186E2-552A-4CFB-9E1D-016E62AD44FB", "versionEndExcluding": "0.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B37C74F-E3A1-4FE4-8731-263D83D404DE", "versionEndExcluding": "0.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD637BBB-45AB-4DC3-A048-DCBD894CE390", "versionEndExcluding": "0.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Bitcoin Core before v0.13.0, a non-final alert is able to block the special \"final alert\" (which is supposed to override all other alerts) because operations occur in the wrong order. This behavior occurs in the remote network alert system (deprecated since Q1 2016). This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins." }, { "lang": "es", "value": "En Bitcoin Core en versiones anteriores a la v0.13.0, una alerta no final puede bloquear la \"alerta final\" especial (que se supone que debe anteponerse a todas las otras alertas) debido a que las operaciones ocurren en el orden incorrecto. Este comportamiento ocurren en el sistema de alertas de red remoto (obsoleto desde el primer trimestre de 2016). Esto afecta a otros usos del c\u00f3digo base, como Bitcoin Knots en versiones anteriores a la v0.13.0.knots20160814 y otros altcoins." } ], "id": "CVE-2016-10725", "lastModified": "2024-11-21T02:44:36.137", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-05T22:29:00.327", "references": [ { "source": "cve@mitre.org", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "cve@mitre.org", "url": "https://github.com/JinBean/CVE-Extension" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/JinBean/CVE-Extension" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-10 11:28
Modified
2025-04-11 00:51
Severity ?
Summary
The Bloom Filter implementation in bitcoind and Bitcoin-Qt 0.8.x before 0.8.4rc1 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted sequence of messages.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bitcoin | bitcoin-qt | 0.8.2 | |
bitcoin | bitcoin-qt | 0.8.2 | |
bitcoin | bitcoin-qt | 0.8.2 | |
bitcoin | bitcoin-qt | 0.8.2 | |
bitcoin | bitcoin-qt | 0.8.3 | |
bitcoin | bitcoin_core | 0.8.0 | |
bitcoin | bitcoin_core | 0.8.0 | |
bitcoin | bitcoin_core | 0.8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F7A15A8-462D-4B96-8914-FF6665A5EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.8.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "440CBFFD-CAF5-4133-910E-9AA04FC2D97D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.8.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "0EF2DF3D-A267-4923-A281-29A8AF4BED1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.8.2:rc3:*:*:*:*:*:*", "matchCriteriaId": "E77F36FC-34E6-499D-9143-B7B56F75FA96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "535357F4-3B07-4C32-83B3-AD1E92FD788B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1FB8897-6ABE-48D4-A917-571342DF93FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DA424B29-2C7E-49FB-AA7B-F27F0489EB63", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "53B8A243-3A29-4E36-9974-6C19D944E9ED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bloom Filter implementation in bitcoind and Bitcoin-Qt 0.8.x before 0.8.4rc1 allows remote attackers to cause a denial of service (divide-by-zero error and daemon crash) via a crafted sequence of messages." }, { "lang": "es", "value": "La implementaci\u00f3n del Filtro Bloom en bitcoind y Bitcoin-Qt 0.8.x anteriores a 0.8.4rc1 permite a atacantes remotos causar una denegaci\u00f3n de servicio (error de divisi\u00f3n entre 0 y ca\u00edda del demonio) a trav\u00e9s de una secuencia de mensajes manipulada." } ], "id": "CVE-2013-5700", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-10T11:28:41.127", "references": [ { "source": "cve@mitre.org", "url": "https://bitcointalk.org/index.php?topic=287351" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcointalk.org/index.php?topic=287351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-12 11:28
Modified
2025-04-11 00:51
Severity ?
Summary
bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:*:rc4:*:*:*:*:*:*", "matchCriteriaId": "E080E161-2DAC-4C34-8398-DDD146506DB8", "versionEndIncluding": "0.4.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "107C630C-68AD-478B-9206-403CCEAE9B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "27CD6BDE-3732-4863-B855-A0FD022DD62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "20635DAC-54CF-48C4-979A-7E909A985093", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "0264EBF9-C104-49C5-9F43-E0CCC73154B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2233FD0-6F87-4B8B-BDC9-C633F428BA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "80FA08FC-3D57-467B-838B-FDF1E67BF609", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "1DB1A621-F271-4120-A642-CAC3D09232AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D758886-F560-4FF6-88DA-C5EEBAACA20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F473942D-1B5B-4348-9896-9828976A3C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A56DE917-D389-4D60-8586-D4F1DEB9012A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "32A19BEA-853D-4727-B456-FCBAFF36CDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "D009847B-E8E7-4472-8260-4A334438C587", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1CD19345-15B5-4B2F-B3B9-4D57CCBFFF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F0499EA1-85AD-48EC-A8D0-CBEDB85429AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "61F25360-9436-41C9-82CB-39D7FF087C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "83F460DD-E537-430D-A370-485E0A707560", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9264DE-6336-4654-8E8A-A3725B845D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "B7A0874D-2223-4577-A8E6-93455B9C1DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C15FA7C-F87A-45F5-B6A3-5E2DA63AACB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6B138-0ED9-4205-B544-66C4C60C3A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "8494FF99-5D8C-497A-90E7-3D87807F5997", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03E74F91-82C2-435C-BB20-3FF25E431B4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4596F85F-66DA-46DB-BF7B-BB1C01E0B67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "63681DB5-2644-476C-86AD-D7DCD69AE1FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "42BE2305-B58F-4D12-80B1-AF0BF29E15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4FEB8A5B-52A4-4D67-8472-46399998C4E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "AACA3639-4F17-4E4E-BBFF-23D6252DDB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "148CF2B0-2C70-47B9-9547-382AE458DCFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:rc:*:*:*:*:*:*", "matchCriteriaId": "74398A03-74B4-4EC4-A15E-047367614EC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AF597D-8BBD-44FE-B0C9-8B03B0350F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBEC9080-8DE2-4E55-AC46-AE9D42AC174D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EAA8B1F0-BC5C-4358-9A0A-3753E8566BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4381211-305A-4FAD-BD0F-56513F153958", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AA1D165-3E63-4B9F-AC17-CCDD2BEF5E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D079E05-C980-4257-9B39-D0750BF318D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3013254-B002-4F67-B6A0-747F9F82250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6312FFC8-EF3F-4B74-8000-080C3FBA1AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "27283E3F-E88A-45ED-8BFA-C9C6A09EA642", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "73BE7AA5-D1A4-4F2E-9D97-9649E6F42B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B99F940E-EF59-4150-B980-0C70DC5995DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9F5744C1-16A1-4617-B3D0-90305DD0C145", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B323C69A-C343-4FF3-BA70-2449A9083907", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8BA3817C-4DC0-4867-8DD9-7B912602C80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AAD1B466-3E8D-4179-8AEE-07E51B04D396", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:*:rc4:*:*:*:*:*:*", "matchCriteriaId": "F0EC3A7C-D203-459E-8F03-3E0E859CB7FE", "versionEndIncluding": "0.4.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "0430A512-206A-4143-AC5F-C3E0AF19AD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E0AB1-DE49-46EA-AF18-FA9D053E2DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "D29BF4F1-A79D-4AED-8D1A-59C58093F621", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "57E4D76A-A84C-49F5-BDED-F64BB4C49972", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "3E64AEBF-988A-476E-9275-8B42C66F7101", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D062707E-A0FC-4A89-A59B-D68EFAFA8683", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9979189E-737C-48F1-BBB3-2E878EC4D4D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "416E87CB-03CC-4C72-9A41-CEE09A8A4FAD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction." }, { "lang": "es", "value": "bitcoind y Bitcoin-Qt anterior a v0.4.9rc1, v0.5.x anterior a v0.5.8rc1, v0.6.0 anterior a v0.6.0.11rc1, v0.6.1 hasta v0.6.5 anterior a v0.6.5rc1, y v0.7.x anterior a v0.7.3rc1 hacen m\u00e1s f\u00e1cil para atacantes remotos obtener informaci\u00f3n sensible sobre el cambio devuelto al aprovechar cierta previsibilidad en los resultados de una operaci\u00f3n de Bitcoin." } ], "id": "CVE-2013-2273", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-12T11:28:18.357", "references": [ { "source": "cve@mitre.org", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://en.bitcoin.it/wiki/CVEs" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-12 11:28
Modified
2025-04-11 00:51
Severity ?
Summary
The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "107C630C-68AD-478B-9206-403CCEAE9B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.4.8:rc4:*:*:*:*:*:*", "matchCriteriaId": "F567F467-E340-4BBA-9D42-DC3445EE09DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "27CD6BDE-3732-4863-B855-A0FD022DD62F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "20635DAC-54CF-48C4-979A-7E909A985093", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "0264EBF9-C104-49C5-9F43-E0CCC73154B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2233FD0-6F87-4B8B-BDC9-C633F428BA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "80FA08FC-3D57-467B-838B-FDF1E67BF609", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "1DB1A621-F271-4120-A642-CAC3D09232AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D758886-F560-4FF6-88DA-C5EEBAACA20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F473942D-1B5B-4348-9896-9828976A3C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A56DE917-D389-4D60-8586-D4F1DEB9012A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "D009847B-E8E7-4472-8260-4A334438C587", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA342670-9FC6-48C8-91B7-04019D2219A2", "versionEndIncluding": "0.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1CD19345-15B5-4B2F-B3B9-4D57CCBFFF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F0499EA1-85AD-48EC-A8D0-CBEDB85429AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "61F25360-9436-41C9-82CB-39D7FF087C2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "83F460DD-E537-430D-A370-485E0A707560", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9264DE-6336-4654-8E8A-A3725B845D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "B7A0874D-2223-4577-A8E6-93455B9C1DA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C15FA7C-F87A-45F5-B6A3-5E2DA63AACB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6B138-0ED9-4205-B544-66C4C60C3A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "8494FF99-5D8C-497A-90E7-3D87807F5997", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03E74F91-82C2-435C-BB20-3FF25E431B4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4596F85F-66DA-46DB-BF7B-BB1C01E0B67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "63681DB5-2644-476C-86AD-D7DCD69AE1FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "42BE2305-B58F-4D12-80B1-AF0BF29E15CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4FEB8A5B-52A4-4D67-8472-46399998C4E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "AACA3639-4F17-4E4E-BBFF-23D6252DDB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.4.7:rc2:*:*:*:*:*:*", "matchCriteriaId": "148CF2B0-2C70-47B9-9547-382AE458DCFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:rc:*:*:*:*:*:*", "matchCriteriaId": "74398A03-74B4-4EC4-A15E-047367614EC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AF597D-8BBD-44FE-B0C9-8B03B0350F74", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBEC9080-8DE2-4E55-AC46-AE9D42AC174D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EAA8B1F0-BC5C-4358-9A0A-3753E8566BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4381211-305A-4FAD-BD0F-56513F153958", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.5.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "0AA1D165-3E63-4B9F-AC17-CCDD2BEF5E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D079E05-C980-4257-9B39-D0750BF318D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3013254-B002-4F67-B6A0-747F9F82250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6312FFC8-EF3F-4B74-8000-080C3FBA1AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "27283E3F-E88A-45ED-8BFA-C9C6A09EA642", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "73BE7AA5-D1A4-4F2E-9D97-9649E6F42B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B99F940E-EF59-4150-B980-0C70DC5995DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9F5744C1-16A1-4617-B3D0-90305DD0C145", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "B323C69A-C343-4FF3-BA70-2449A9083907", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "8BA3817C-4DC0-4867-8DD9-7B912602C80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AAD1B466-3E8D-4179-8AEE-07E51B04D396", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.4.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "CC730AD6-2B5B-47A2-881E-B543ABD77AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "0430A512-206A-4143-AC5F-C3E0AF19AD6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E0AB1-DE49-46EA-AF18-FA9D053E2DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.0.10:rc4:*:*:*:*:*:*", "matchCriteriaId": "D29BF4F1-A79D-4AED-8D1A-59C58093F621", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "57E4D76A-A84C-49F5-BDED-F64BB4C49972", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.6.4:rc4:*:*:*:*:*:*", "matchCriteriaId": "3E64AEBF-988A-476E-9275-8B42C66F7101", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D062707E-A0FC-4A89-A59B-D68EFAFA8683", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9979189E-737C-48F1-BBB3-2E878EC4D4D7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain." }, { "lang": "es", "value": "El m\u00e9todo CTransaction::FetchInputs en bitcoind y Bitcoin-Qt anterior a v0.8.0rc1 copia transacciones del disco a la memoria sin comprobar de forma incremental \"spent prevouts\", lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de disco I/O) a trav\u00e9s de una transacci\u00f3n de Bitcoin con muchas entradas correspondientes a diferentes partes de la cadena de bloque almacenado (block chain)." } ], "id": "CVE-2013-2293", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-12T11:28:18.390", "references": [ { "source": "cve@mitre.org", "url": "https://bitcointalk.org/?topic=144122" }, { "source": "cve@mitre.org", "url": "https://en.bitcoin.it/wiki/CVE-2013-2293" }, { "source": "cve@mitre.org", "url": "https://en.bitcoin.it/wiki/CVEs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcointalk.org/?topic=144122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://en.bitcoin.it/wiki/CVE-2013-2293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://en.bitcoin.it/wiki/CVEs" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-05 22:29
Modified
2024-11-21 02:44
Severity ?
Summary
Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bitcoin | bitcoin_core | * | |
bitcoin | bitcoin-qt | * | |
bitcoin | bitcoind | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "C55186E2-552A-4CFB-9E1D-016E62AD44FB", "versionEndExcluding": "0.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B37C74F-E3A1-4FE4-8731-263D83D404DE", "versionEndExcluding": "0.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bitcoin:bitcoind:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD637BBB-45AB-4DC3-A048-DCBD894CE390", "versionEndExcluding": "0.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins." }, { "lang": "es", "value": "Bitcoin Core en versiones anteriores a la v0.13.0 permite una denegaci\u00f3n de servicio (DoS) desencadenada por el sistema de alertas de red remoto (obsoleto desde el primer trimestre de 2016) si un atacante puede firmar un mensaje con una clave privada determinada que sea conocida por actores no planeados debido a un mapa de tama\u00f1o infinito. Esto afecta a otros usos del c\u00f3digo base, como Bitcoin Knots en versiones anteriores a la v0.13.0.knots20160814 y otros altcoins." } ], "id": "CVE-2016-10724", "lastModified": "2024-11-21T02:44:35.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-05T22:29:00.233", "references": [ { "source": "cve@mitre.org", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "cve@mitre.org", "url": "https://github.com/JinBean/CVE-Extension" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/JinBean/CVE-Extension" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }