Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-0184 | Go Ethereum vulnerable to DoS via malicious p2p message |
Github GHSA |
GHSA-q26p-9cq4-7fc2 | Go Ethereum vulnerable to DoS via malicious p2p message |
Thu, 30 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.14.13. | |
| Title | go-ethereum has a DoS via malicious p2p message | |
| Weaknesses | CWE-248 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-30T16:25:15.290Z
Reserved: 2025-01-27T15:32:29.450Z
Link: CVE-2025-24883
Updated: 2025-01-30T16:25:11.572Z
Status : Deferred
Published: 2025-01-30T16:15:31.947
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-24883
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:07:08Z
EUVD
Github GHSA