We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-34458

mx-chain-go's relayed transactions always increment nonce



Description

mx-chain-go is the official implementation of the MultiversX blockchain protocol, written in golang. When executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch` was needed. This was a strict processing issue while validating blocks on a chain. This vulnerability has been patched in version 1.4.17.

Reserved 2023-06-06 | Published 2023-07-13 | Updated 2024-10-22 | Assigner GitHub_M


HIGH: 7.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H

Problem types

CWE-400: Uncontrolled Resource Consumption

Product status

< 1.4.17
affected

References

github.com/...ain-go/security/advisories/GHSA-j494-7x2v-vvvp

github.com/...ommit/babdb144f1316ab6176bf3dbd7d4621120414d43

github.com/...tionTests/vm/txsFee/relayedMoveBalance_test.go

github.com/multiversx/mx-chain-go/releases/tag/v1.4.17

cve.org (CVE-2023-34458)

nvd.nist.gov (CVE-2023-34458)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-34458

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.