Skip to content

DoS via malicious p2p message

High
fjl published GHSA-q26p-9cq4-7fc2 Jan 30, 2025

Package

gomod github.com/ethereum/go-ethereum (Go)

Affected versions

>= 1.14.0, < 1.14.13

Patched versions

>= 1.14.13

Description

Impact

A vulnerable node can be forced to shutdown/crash using a specially crafted message.

During the peer-to-peer connection handshake, a shared secret key is computed. The implementation
did not verify whether the EC public key provided by the remote party is a valid point on the secp256k1 curve.
By simply sending an all-zero public key, a crash could be induced due to unexpected results from the handshake.

The issue was fixed by adding a curve point validity check in 159fb1a

Patches

A fix has been included in geth version 1.14.13 and onwards.

Workarounds

Unfortunately, no workaround is available.

Credits

This issue was originally reported to Polygon Security by David Matosse (@iam-ned).

Severity

High

CVE ID

CVE-2025-24883

Weaknesses

No CWEs

Credits