CVE-2013-2273
https://notcve.org/view.php?id=CVE-2013-2273
bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction. bitcoind y Bitcoin-Qt anterior a v0.4.9rc1, v0.5.x anterior a v0.5.8rc1, v0.6.0 anterior a v0.6.0.11rc1, v0.6.1 hasta v0.6.5 anterior a v0.6.5rc1, y v0.7.x anterior a v0.7.3rc1 hacen más fácil para atacantes remotos obtener información sensible sobre el cambio devuelto al aprovechar cierta previsibilidad en los resultados de una operación de Bitcoin. • https://en.bitcoin.it/wiki/CVEs • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2013-2293
https://notcve.org/view.php?id=CVE-2013-2293
The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain. El método CTransaction::FetchInputs en bitcoind y Bitcoin-Qt anterior a v0.8.0rc1 copia transacciones del disco a la memoria sin comprobar de forma incremental "spent prevouts", lo que permite a atacantes remotos provocar una denegación de servicio (consumo de disco I/O) a través de una transacción de Bitcoin con muchas entradas correspondientes a diferentes partes de la cadena de bloque almacenado (block chain). • https://bitcointalk.org/?topic=144122 https://en.bitcoin.it/wiki/CVE-2013-2293 https://en.bitcoin.it/wiki/CVEs • CWE-399: Resource Management Errors •
CVE-2012-4684
https://notcve.org/view.php?id=CVE-2012-4684
The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert. La funcionalidad Alert en bitcoind y Bitcoin-Qt anterior a v0.7.0 soporta diferentes representaciones de caractéres de la misma firma de datos, pero depende del hash de esta firma, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de recursos) a través de una firma válida modificada para una alerta circulante. • https://bitcointalk.org/index.php?topic=148109.0 https://bitcointalk.org/index.php?topic=8392.0 https://en.bitcoin.it/wiki/CVE-2012-4684 https://en.bitcoin.it/wiki/CVEs • CWE-399: Resource Management Errors •
CVE-2013-2292
https://notcve.org/view.php?id=CVE-2013-2292
bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes. Bitcoind y Bitcoin-Qt v0.8.0 y anteriores permiten a atacantes remotos provocar una denegación de servicio por minar un bloque para crear una transacción Bitcoin no estándar opcodes OP_CHECKSIG. • https://bitcointalk.org/?topic=140078 https://en.bitcoin.it/wiki/CVEs • CWE-399: Resource Management Errors •
CVE-2013-2272
https://notcve.org/view.php?id=CVE-2013-2272
The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees. El mecanismo de protección "penny-flooding" en el método CTxMemPool::accept en bitcoind and Bitcoin-Qt before v0.4.9rc1, v0.5.x anterior a v0.5.8rc1, v0.6.0 anterior a v0.6.0.11rc1, v0.6.1 hasta v0.6.5 anterior a v0.6.5rc1, y v0.7.x anterior a v0.7.3rc1 permite a atacantes remotos determinar asociaciones entre "wallet addresses" y direcciones IP mediante una serie de transacciones Bitcoin con insuficientes tasas. • https://bitcointalk.org/?topic=135856 https://en.bitcoin.it/wiki/CVEs • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •