5 results (0.003 seconds)

CVSS: 8.2EPSS: 0%CPEs: 2EXPL: 1

Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. • https://github.com/lightningnetwork/lnd/issues/7096 https://github.com/lightningnetwork/lnd/pull/7098 https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking. btcd anterior a 0.23.2, como se usa en Lightning Labs lnd anterior a 0.15.2-beta y otros productos relacionados con Bitcoin, maneja mal la verificación del tamaño de los testigos. • https://github.com/btcsuite/btcd/pull/1896 https://github.com/btcsuite/btcd/releases/tag/v0.23.2 https://github.com/lightningnetwork/lnd/issues/7002 https://github.com/lightningnetwork/lnd/releases/tag/v0.15.2-beta •

CVSS: 8.6EPSS: 0%CPEs: 38EXPL: 1

Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure. Lightning Labs lnd versiones anteriores a 0.13.3-beta, permite una pérdida de fondos debido a una exposición del polvo HTLC • https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing https://github.com/lightningnetwork/lnd/blob/master/docs/release-notes/release-notes-0.13.3.md https://github.com/lightningnetwork/lnd/releases/tag/v0.13.3-beta https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/0 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.2EPSS: 0%CPEs: 6EXPL: 0

Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy. • https://gist.github.com/ariard/6bdeb995565d1cc292753e1ee4ae402d https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002855.html https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002857.html • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 5.3EPSS: 0%CPEs: 54EXPL: 0

Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations. Antes de la versión 0.10.0-beta, el LND (Lightning Network Daemon) habría aceptado una firma de contrapartida de alta-S y transmitido transacciones de compromiso local/HTLC inválidas de retransmisión tx. Esto puede ser explotado por cualquier par con un canal abierto, independientemente de la situación de la víctima (por ejemplo, nodo de enrutamiento, pagador-receptor o pagador-emisor). • https://gist.github.com/ariard/fb432a9d2cd3ba24fdc18ccc8c5c6eb4 https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002856.html https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-October/002858.html • CWE-354: Improper Validation of Integrity Check Value •