CVE-2022-29177: DoS via malicious p2p message in Go Ethereum
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54244%
CWE
Published
5/24/2022
Updated
1/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/ethereum/go-ethereum | go | < 1.10.17 | 1.10.17 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in p2p message handling with high verbosity logging. Key functions were identified through: 1) Protocol entry points (handler.handleMsg
) where messages are processed 2) Network layer message loops (Peer.run
) that receive raw data. Both locations would log message contents at DEBUG/TRACE levels. The patch likely added message size validation()
before logging. Confidence is medium as analysis is based on vulnerability patterns rather than explicit patch diffs.