
Cloud Vulnerability DB
A community-led vulnerabilities database
Go-Ethereum (geth) version 1.10.9 was discovered to be vulnerable to a denial of service attack where nodes would crash after receiving a series of specially crafted messages and could not be recovered. The vulnerability was disclosed on November 8, 2021, affecting nodes running in fast sync mode (GitHub Issue).
The vulnerability manifests as a runtime error with the message "invalid memory address or nil pointer dereference" which triggers a SEGV signal. The crash occurs in the goleveldb component when handling certain p2p messages. According to the CVSS 3.1 scoring, this vulnerability has a base score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When successfully exploited, the vulnerability causes affected nodes to crash and become unrecoverable, leading to a denial of service condition. This particularly impacts nodes running in fast sync mode, potentially disrupting network operations and blockchain synchronization (GitHub Issue).
The vulnerability was addressed in subsequent versions of go-ethereum. Users running affected versions (1.10.9) should upgrade to a patched version to prevent potential exploitation (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."