First published: Wed Dec 07 2022(Updated: )
js-libp2p is the official javascript Implementation of libp2p networking stack. Versions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to update their js-libp2p dependency to `v0.38.0` or greater. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libp2p | <0.38.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23487 is a vulnerability in js-libp2p, the official JavaScript implementation of the libp2p networking stack, where versions older than v0.38.0 are vulnerable to targeted resource exhaustion attacks.
An attacker can exploit CVE-2022-23487 by launching targeted resource exhaustion attacks that affect libp2p's connection, stream, peer, and memory management.
The severity of CVE-2022-23487 is high with a CVSS score of 7.5.
Versions of js-libp2p older than v0.38.0 are affected by CVE-2022-23487.
To fix CVE-2022-23487, you should update js-libp2p to version v0.38.0 or newer.