Miggo Logo

CVE-2022-29177: DoS via malicious p2p message in Go Ethereum

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.54244%
Published
5/24/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/ethereum/go-ethereumgo< 1.10.171.10.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in p2p message handling with high verbosity logging. Key functions were identified through: 1) Protocol entry points (handler.handleMsg) where messages are processed 2) Network layer message loops (Peer.run) that receive raw data. Both locations would log message contents at DEBUG/TRACE levels. The patch likely added message size validation() before logging. Confidence is medium as analysis is based on vulnerability patterns rather than explicit patch diffs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * vuln*r**l* no**, i* *on*i*ur** to us* *i** v*r*osity lo**in*, **n ** m*** to *r*s* w**n **n*lin* sp**i*lly *r**t** p*p m*ss***s s*nt *rom *n *tt**k*r no**. ### P*t***s T** *ollowin* PR ***r*ss*s t** pro*l*m: *ttps://*it*u*.*om/*t**r*

Reasoning

T** vuln*r**ility m*ni**sts in p*p m*ss*** **n*lin* wit* *i** v*r*osity lo**in*. K*y *un*tions w*r* i**nti*i** t*rou**: *) Proto*ol *ntry points (`**n*l*r.**n*l*Ms*`) w**r* m*ss***s *r* pro**ss** *) N*twork l*y*r m*ss*** loops (`P**r.run`) t**t r***i