-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DoS via malicious p2p message, upstream CVE-2022-29177 #22
Comments
Hi, Thank you VERY much for your report. We have already contacted the operators of all those validators. They are all using a default logging level of "INFO", which makes their node not vulnerable to this attack. We will cherry-pick the fix later. We would like to buy you a coffee. We have sent 1 sKCS token to your wallet. The TX hash is : https://scan.kcc.io/tx/0x947adb12a415188d56d6c7df117fdb313a9c2ebda11c24000bfd42d33b450f8e Best Regards. |
Review from the KCC TeamThe Line 57 in a4ba265
If the vulnerable node uses a logging level of "Debug" or "Trace", the node will try to print the error out. However, to print the error out, the method "String()" of the Lines 91 to 96 in a4ba265
An "index out of range" runtime error will occur on Line 95. |
Describe the bug
KCC's implementation of the p2p disc message deserialization is vulnerable to the same CVE as reported upstream in CVE-2022-29177
The fix is quite simple, please take the time to cherrypick ethereum#24507
If you are so kind as to provide a bug bounty for this heads up, feel free to donate some tokens to 0xD736B7c9eB18EaE030fA229DD0EC32694De36eA8
I do use Kucoin so some Kucoin tokens would be VERY much appreciated, thank you!
Much appreciated and hope you cherrypick the fix.
The text was updated successfully, but these errors were encountered: