Page 2 of 10 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25. Go Ethereum, o "Geth", es la implementación oficial de Golang del protocolo Ethereum. • https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46 https://github.com/ethereum/go-ethereum/pull/21896 https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25 https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. This issue is fixed as of 1.9.24 Go Ethereum, o "Geth", es la implementación oficial de Golang del protocolo Ethereum. • https://blog.ethereum.org/2020/11/12/geth_security_release https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0 https://github.com/ethereum/go-ethereum/pull/21793 https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p • CWE-682: Incorrect Calculation •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. This is a Consensus vulnerability in Geth before version 1.9.17 which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. Geth's pre-compiled dataCopy (at 0x00...04) contract did a shallow copy on invocation. An attacker could deploy a contract that writes X to an EVM memory region R, then calls 0x00..04 with R as an argument, then overwrites R to Y, and finally invokes the RETURNDATACOPY opcode. When this contract is invoked, a consensus-compliant node would push X on the EVM stack, whereas Geth would push Y. • https://blog.ethereum.org/2020/11/12/geth_security_release https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf • CWE-682: Incorrect Calculation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.18, there is a Denial-of-service (crash) during block processing. This is fixed in 1.9.18. Go Ethereum, o "Geth", es la implementación oficial de Golang del protocolo Ethereum. En Geth versiones anteriores a 1.9.18, se presenta una Denegación de servicio (bloqueo) durante el procesamiento de bloques. • https://blog.ethereum.org/2020/11/12/geth_security_release https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

cmd/evm/runner.go in Go Ethereum (aka geth) 1.8.17 allows attackers to cause a denial of service (SEGV) via crafted bytecode. cmd/evm/runner.go en Go Ethereum (alias geth) 1.8.17 permite a los atacantes provocar una denegación de servicio (SEGV) mediante un código de bytes manipulado. • https://github.com/ethereum/go-ethereum/issues/18069 • CWE-476: NULL Pointer Dereference •