fkie_cve-2024-35202
Vulnerability from fkie_nvd
Published
2024-10-10 13:15
Modified
2025-05-22 16:51
Severity ?
Summary
Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/ | Patch, Vendor Advisory | |
cve@mitre.org | https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures | Third Party Advisory | |
cve@mitre.org | https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md | Release Notes | |
cve@mitre.org | https://github.com/bitcoin/bitcoin/pull/26898 | Issue Tracking | |
cve@mitre.org | https://github.com/bitcoin/bitcoin/releases/tag/v25.0 | Release Notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bitcoin | bitcoin_core | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "63478AA2-EF03-4005-93A1-443733DB2063", "versionEndExcluding": "25.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block\u0027s merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance." }, { "lang": "es", "value": "Las versiones anteriores a la 25.0 de Bitcoin Core permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (afirmaci\u00f3n de manejo de mensajes blocktxn y salida de nodo) mediante la inclusi\u00f3n de transacciones en un mensaje blocktxn que no est\u00e1n confirmadas en la ra\u00edz merkle de un bloque. FillBlock se puede llamar dos veces para una instancia de PartiallyDownloadedBlock." } ], "id": "CVE-2024-35202", "lastModified": "2025-05-22T16:51:01.657", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-10-10T13:15:14.077", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/bitcoin/bitcoin/pull/26898" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/bitcoin/bitcoin/releases/tag/v25.0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…