Vulnerability Description
Go Ethereum (aka geth) 1.8.19 allows attackers to cause a denial of service (memory consumption) by rewriting the length of a dynamic array in memory, and then writing data to a single memory location with a large index number, as demonstrated by use of "assembly { mstore }" followed by a "c[0xC800000] = 0xFF" assignment.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ethereum | Go Ethereum | 1.8.19 |
Related Weaknesses (CWE)
References
- https://github.com/ethereum/go-ethereum/issues/18289ExploitThird Party Advisory
- https://github.com/ethereum/go-ethereum/issues/18289ExploitThird Party Advisory
FAQ
What is CVE-2018-20421?
CVE-2018-20421 is a vulnerability with a CVSS score of 7.5 (HIGH). Go Ethereum (aka geth) 1.8.19 allows attackers to cause a denial of service (memory consumption) by rewriting the length of a dynamic array in memory, and then writing data to a single memory location...
How severe is CVE-2018-20421?
CVE-2018-20421 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20421?
Check the references section above for vendor advisories and patch information. Affected products include: Ethereum Go Ethereum.