CVE-2023-40583
Summary
| CVE | CVE-2023-40583 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-25 21:15:00 UTC |
| Updated | 2023-09-01 13:10:00 UTC |
| Description | libp2p is a networking stack and library modularized out of The IPFS Project, and bundled separately for other tools to use. In go-libp2p, by using signed peer records a malicious actor can store an arbitrary amount of data in a remote node’s memory. This memory does not get garbage collected and so the victim can run out of memory and crash. If users of go-libp2p in production are not monitoring memory consumption over time, it could be a silent attack i.e. the attacker could bring down nodes over a period of time (how long depends on the node resources i.e. a go-libp2p node on a virtual server with 4 gb of memory takes about 90 sec to bring down; on a larger server, it might take a bit longer.) This issue was patched in version 0.27.4. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Release v0.27.4 · libp2p/go-libp2p · GitHub | MISC | github.com | |
| Release v0.27.7 · libp2p/go-libp2p · GitHub | MISC | github.com | |
| libp2p nodes vulnerable to OOM attack · Advisory · libp2p/go-libp2p · GitHub | MISC | github.com | |
| identify: reject signed peer records on peer ID mismatch · libp2p/go-libp2p@45d3c6f · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.