libp2p nodes vulnerable to attack using large RSA keys
CVE-2023-39533

7.5HIGH

Key Information:

Vendor

Libp2p

Status
Vendor
CVE Published:
8 August 2023

What is CVE-2023-39533?

A resource exhaustion vulnerability exists in the core/crypto module of go-libp2p, allowing a malicious peer to exploit large RSA keys in a manner that forces a node to spend excessive time on signature verification during the Noise handshake and the libp2p x509 extension verification. To mitigate this issue, it is essential to upgrade to go-libp2p versions 0.27.8, 0.28.2, or 0.29.1. Additionally, users are advised to utilize the updated Go compiler versions 1.20.7 or 1.19.12. Currently, there are no known workarounds for this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

go-libp2p < 0.27.8 < 0.27.8

go-libp2p >= 0.28.0, < 0.28.2 < 0.28.0, 0.28.2

go-libp2p = 0.29.0 = 0.29.0

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.