-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/ethereum/go-ethereum | go | < 1.8.11 | 1.8.11 |
The vulnerability stemmed from the GetBlockHeadersMsg handling logic in ProtocolManager.handleMsg. The commit diff shows the vulnerable code path in the 'hashMode && !query.Reverse' case where query.Skip was used without overflow checks. The patch added validation for 'current + query.Skip + 1' to prevent integer underflow/overflow. The CVE description and commit message explicitly reference the GetBlockHeadersMsg handler as the vulnerable component.