mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
89 lines
3.2 KiB
JSON
89 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2022-35913",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-09-06T23:15:08.537",
|
|
"lastModified": "2022-09-16T21:34:30.793",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Samourai Wallet Stonewallx2 0.99.98e allows a denial of service via a P2P coinjoin. The attacker and victim must follow each other's paynym. Then, the victim must try to collaborate with the attacker for a Stonewallx2 transaction. Next, the attacker broadcasts a tx, spending the inputs used in Stonewallx2 before the victim can broadcast the collaborative transaction. The attacker does not signal opt in RBF, and uses the lowest fee rate. This would result in the victim being unable to perform Stonewallx2. (Note that the attacker could use multiple paynyms.)"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Samourai Wallet Stonewallx2 versi\u00f3n 0.99.98e, permite una denegaci\u00f3n de servicio por medio de un coinjoin P2P. El atacante y la v\u00edctima deben seguir el paynym del otro. Luego, la v\u00edctima debe intentar colaborar con el atacante para una transacci\u00f3n de Stonewallx2. A continuaci\u00f3n, el atacante emite una tx, gastando las entradas usadas en Stonewallx2 antes de que la v\u00edctima pueda emitir la transacci\u00f3n de colaboraci\u00f3n. El atacante no se\u00f1ala la opci\u00f3n en RBF, y usa la tarifa m\u00e1s baja. Esto rsultar\u00eda en que la v\u00edctima no pudiera llevar a cabo Stonewallx2. (Tenga en cuenta que el atacante podr\u00eda usar m\u00faltiples paynyms)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:kayako:samourai:0.99.98e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50E1536A-0E86-4566-89D1-D0BAA7800072"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-July/020737.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-June/020595.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |