A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
References
Link | Resource |
---|---|
http://ethereum.com | Product |
http://go-ethereum.com | Product |
https://dl.acm.org/doi/pdf/10.1145/3460120.3485369 | Exploit Mitigation Technical Description Third Party Advisory |
https://tristartom.github.io/docs/ccs21.pdf | Exploit Mitigation Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-04T11:24:22
Updated: 2022-03-04T11:24:22
Reserved: 2022-01-18T00:00:00
Link: CVE-2022-23328
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-04T12:15:07.930
Modified: 2022-03-17T15:39:07.107
Link: CVE-2022-23328
JSON object: View
Redhat Information
No data.
CWE