CVE-2024-35202 (GCVE-0-2024-35202)
Vulnerability from cvelistv5 – Published: 2024-10-10 00:00 – Updated: 2024-10-10 15:24
VLAI?
Summary
Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:bitcoin:bitcoin:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "bitcoin",
"vendor": "bitcoin",
"versions": [
{
"lessThan": "25.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-35202",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T15:21:26.158094Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T15:24:42.395Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block\u0027s merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-10T12:46:24.631113",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"
},
{
"url": "https://github.com/bitcoin/bitcoin/releases/tag/v25.0"
},
{
"url": "https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/"
},
{
"url": "https://github.com/bitcoin/bitcoin/pull/26898"
},
{
"url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-35202",
"datePublished": "2024-10-10T00:00:00",
"dateReserved": "2024-05-12T00:00:00",
"dateUpdated": "2024-10-10T15:24:42.395Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block\u0027s merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance.\"}, {\"lang\": \"es\", \"value\": \"Las versiones anteriores a la 25.0 de Bitcoin Core permiten a atacantes remotos provocar una denegaci\\u00f3n de servicio (afirmaci\\u00f3n de manejo de mensajes blocktxn y salida de nodo) mediante la inclusi\\u00f3n de transacciones en un mensaje blocktxn que no est\\u00e1n confirmadas en la ra\\u00edz merkle de un bloque. FillBlock se puede llamar dos veces para una instancia de PartiallyDownloadedBlock.\"}]",
"id": "CVE-2024-35202",
"lastModified": "2024-10-15T12:58:51.050",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-10-10T13:15:14.077",
"references": "[{\"url\": \"https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://github.com/bitcoin/bitcoin/pull/26898\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://github.com/bitcoin/bitcoin/releases/tag/v25.0\", \"source\": \"cve@mitre.org\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-35202\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-10-10T13:15:14.077\",\"lastModified\":\"2025-05-22T16:51:01.657\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block\u0027s merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance.\"},{\"lang\":\"es\",\"value\":\"Las versiones anteriores a la 25.0 de Bitcoin Core permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (afirmaci\u00f3n de manejo de mensajes blocktxn y salida de nodo) mediante la inclusi\u00f3n de transacciones en un mensaje blocktxn que no est\u00e1n confirmadas en la ra\u00edz merkle de un bloque. FillBlock se puede llamar dos veces para una instancia de PartiallyDownloadedBlock.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"25.0\",\"matchCriteriaId\":\"63478AA2-EF03-4005-93A1-443733DB2063\"}]}]}],\"references\":[{\"url\":\"https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/bitcoin/bitcoin/pull/26898\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/bitcoin/bitcoin/releases/tag/v25.0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-35202\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-10T15:21:26.158094Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:bitcoin:bitcoin:-:*:*:*:*:*:*:*\"], \"vendor\": \"bitcoin\", \"product\": \"bitcoin\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"25.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770 Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-10T15:24:32.809Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures\"}, {\"url\": \"https://github.com/bitcoin/bitcoin/releases/tag/v25.0\"}, {\"url\": \"https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/\"}, {\"url\": \"https://github.com/bitcoin/bitcoin/pull/26898\"}, {\"url\": \"https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block\u0027s merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-10-10T12:46:24.631113\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-35202\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-10T15:24:42.395Z\", \"dateReserved\": \"2024-05-12T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-10-10T00:00:00\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…