#38850 [BC-Low] Remote P2P OOM Crash (GetBlockHeaders) / Reth
Description
Intro
Vulnerability Details
./reth node --datadir=/data/storage/reth --chain=sepolia --http --http.addr=0.0.0.0 --http.port=8545 --http.api=eth,net,web3,debug --ws --ws.addr=0.0.0.0 --ws.port=8546 --metrics=0.0.0.0:9001 --authrpc.addr=0.0.0.0 --authrpc.port=8551 --authrpc.jwtsecret=/data/storage/jwt.hex --port=30303Attack scenario
Attack code
Steps to reproduce (Ubuntu)
The case for High severity (@Ethereum and Immunefi)
Impact
Proof of Concept
Previous#37505 [BC-Insight] Remotely spamming 1 byte leads to full peer removal and desync in both execution and consensus clientsNext#37483 [BC-Insight] There is a trace discrepancy for Nethermind when handling EOF from PUSH opcode
Last updated
Was this helpful?