2024-07-14 02:06:08 +00:00

106 lines
3.3 KiB
JSON

{
"id": "CVE-2018-20421",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-12-24T03:29:00.353",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Go Ethereum (aka geth) 1.8.19 allows attackers to cause a denial of service (memory consumption) by rewriting the length of a dynamic array in memory, and then writing data to a single memory location with a large index number, as demonstrated by use of \"assembly { mstore }\" followed by a \"c[0xC800000] = 0xFF\" assignment."
},
{
"lang": "es",
"value": "Go Ethereum (tambi\u00e9n conocido como geth) 1.8.19 permite que los atacantes provoquen una denegaci\u00f3n de servicio (consumo de memoria) mediante la reescritura de la longitud de un array din\u00e1mico en la memoria y, a continuaci\u00f3n, la escritura de datos a una \u00fanica ubicaci\u00f3n de memoria con un n\u00famero de \u00edndice largo. Esto queda demostrado por el uso de \"assembly { mstore }\", seguido por una asignaci\u00f3n \"c[0xC800000] = 0xFF\"."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereum:go_ethereum:1.8.19:*:*:*:*:*:*:*",
"matchCriteriaId": "62904AD1-8114-4802-94E1-D19C48CBF8FD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ethereum/go-ethereum/issues/18289",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}