Vulnerability Description
The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitcoin | Bitcoin-Qt | 0.6.3 |
| Bitcoin | Bitcoin Core | 0.3.4 |
| Bitcoin | Bitcoind | 0.6.3 |
| Bitcoin | Wxbitcoin | 0.3.4 |
Related Weaknesses (CWE)
References
- https://bitcointalk.org/index.php?topic=148109.0
- https://bitcointalk.org/index.php?topic=8392.0
- https://en.bitcoin.it/wiki/CVE-2012-4684
- https://en.bitcoin.it/wiki/CVEs
- https://bitcointalk.org/index.php?topic=148109.0
- https://bitcointalk.org/index.php?topic=8392.0
- https://en.bitcoin.it/wiki/CVE-2012-4684
- https://en.bitcoin.it/wiki/CVEs
FAQ
What is CVE-2012-4684?
CVE-2012-4684 is a vulnerability with a CVSS score of 7.8 (HIGH). The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote att...
How severe is CVE-2012-4684?
CVE-2012-4684 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-4684?
Check the references section above for vendor advisories and patch information. Affected products include: Bitcoin Bitcoin-Qt, Bitcoin Bitcoin Core, Bitcoin Bitcoind, Bitcoin Wxbitcoin.