Vulnerability Description
Multiple heap-based buffer overflows in the parse_notify function in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 4.1.0 allow remote pool servers to have unspecified impact via a (1) large or (2) negative value in the Extranonc2_size parameter in a mining.subscribe response and a crafted mining.notify request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bfgminer | Bfgminer | <= 4.0.0 |
| Sgminer Project | Sgminer | <= 4.2.1 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2014/Jul/119
- http://www.securityfocus.com/bid/68831
- https://github.com/ckolivas/cgminer/commit/e1c5050734123973b99d181c45e74b2cbb002ExploitPatch
- https://github.com/luke-jr/bfgminer/commit/ff7f30129f15f7a2213f8ced0cd65c9a33149ExploitPatch
- https://github.com/sgminer-dev/sgminer/commit/bac5831b355f916e0696b7bbcccfc51c05ExploitPatch
- https://github.com/sgminer-dev/sgminer/issues/258
- http://seclists.org/fulldisclosure/2014/Jul/119
- http://www.securityfocus.com/bid/68831
- https://github.com/ckolivas/cgminer/commit/e1c5050734123973b99d181c45e74b2cbb002ExploitPatch
- https://github.com/luke-jr/bfgminer/commit/ff7f30129f15f7a2213f8ced0cd65c9a33149ExploitPatch
- https://github.com/sgminer-dev/sgminer/commit/bac5831b355f916e0696b7bbcccfc51c05ExploitPatch
- https://github.com/sgminer-dev/sgminer/issues/258
FAQ
What is CVE-2014-4502?
CVE-2014-4502 is a vulnerability with a CVSS score of 10.0 (HIGH). Multiple heap-based buffer overflows in the parse_notify function in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 4.1.0 allow remote pool servers to have unspecified impact via a (1...
How severe is CVE-2014-4502?
CVE-2014-4502 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-4502?
Check the references section above for vendor advisories and patch information. Affected products include: Bfgminer Bfgminer, Sgminer Project Sgminer.