CVE-2021-31876
https://notcve.org/view.php?id=CVE-2021-31876
Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with nSequence = 0xff_ff_ff_ff, spending an unconfirmed parent with nSequence <= 0xff_ff_ff_fd, should be replaceable because there is inherited signaling by the child transaction. However, the actual PreChecks implementation does not enforce this. Instead, mempool rejects the replacement attempt of the unconfirmed child transaction. Bitcoin Core desde la versión 0.12.0 hasta la versión 0.21.1 no implementa correctamente la política de reemplazo especificada en BIP125, lo que hace más fácil para los atacantes desencadenar una pérdida de fondos, o un ataque de denegación de servicio contra proyectos posteriores como los nodos de la red Lightning. • https://bitcoinops.org/en/newsletters/2021/05/12 https://bitcoinops.org/en/topics/replace-by-fee https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2021-31876 https://github.com/bitcoin/bitcoin https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/018893.html • CWE-863: Incorrect Authorization •
CVE-2021-3401
https://notcve.org/view.php?id=CVE-2021-3401
Bitcoin Core before 0.19.0 might allow remote attackers to execute arbitrary code when another application unsafely passes the -platformpluginpath argument to the bitcoin-qt program, as demonstrated by an x-scheme-handler/bitcoin handler for a .desktop file or a web browser. NOTE: the discoverer states "I believe that this vulnerability cannot actually be exploited." Bitcoin Core versiones anteriores a 0.19.0, podría permitir a atacantes remotos ejecutar código arbitrario cuando otra aplicación pasa de manera no segura el argumento -platformpluginpath al programa bitcoin-qt, como es demostrado por un manejador de esquema x/controlador de bitcoin para un archivo de escritorio o navegador web. NOTA: el descubridor afirma "Creo que esta vulnerabilidad no se puede explotar" • https://achow101.com/2021/02/0.18-uri-vuln https://github.com/bitcoin/bitcoin/pull/16578 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •