Page 2 of 9 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name. NOTE: the official Fabric with Raft prevents exploitation via a locking mechanism and a check for names that already exist. Hyperledger Fabric 2.3 permite a los atacantes provocar una denegación de servicio (caída del pedido) enviando repetidamente un tx de canal diseñado con el mismo nombre de canal. NOTA: el Fabric with Raft oficial evita la explotación mediante un mecanismo de bloqueo y una verificación de nombres que ya existen. • https://github.com/SmartBFT-Go/fabric/issues/286 https://github.com/hyperledger/fabric/pull/2934 • CWE-670: Always-Incorrect Control Flow Implementation •

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 0

Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications. If a gateway client application sends a malformed request to a gateway peer it may crash the peer node. Version 2.4.6 checks for the malformed gateway request and returns an error to the gateway client. There are no known workarounds, users must upgrade to version 2.4.6. Hyperledger Fabric es un marco de libro mayor distribuido de grado empresarial para desarrollar soluciones y aplicaciones. • https://github.com/hyperledger/fabric/pull/3572 https://github.com/hyperledger/fabric/pull/3576 https://github.com/hyperledger/fabric/pull/3577 https://github.com/hyperledger/fabric/releases/tag/v2.4.6 https://github.com/hyperledger/fabric/security/advisories/GHSA-qj6r-fhrc-jj5r • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue. • https://github.com/hyperledger/fabric/commit/0f18359493bcbd5f9f9d1a9b05adabfe5da23b06 https://github.com/hyperledger/fabric/releases/tag/v2.2.7 https://github.com/hyperledger/fabric/releases/tag/v2.4.5 https://github.com/hyperledger/fabric/security/advisories/GHSA-72x4-cq6r-jp4p • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and block signature verification bypass in the transaction and block validator allowing a single node to sign a transaction and/or block multiple times, each with a random nonce, and have other validating nodes accept them as separate valid signatures. Hyperledger Iroha en versiones v1.0_beta y v1.0.0_beta-1 es vulnerable a una omisión de verificación de firma de transacción y bloqueo en el validador de transacción y bloqueo. Esto permite que un único nodo firme una transacción y/o bloquee múltiples veces, cada una con un nonce aleatorio, y haga que otros nodos en validación los acepten como firmas válidas separadas. • https://github.com/hyperledger/iroha/releases/tag/v1.0.0_beta-2 • CWE-347: Improper Verification of Cryptographic Signature •