Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "C55186E2-552A-4CFB-9E1D-016E62AD44FB", "versionEndExcluding": "0.13.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:bitcoin:bitcoin-qt:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B37C74F-E3A1-4FE4-8731-263D83D404DE", "versionEndExcluding": "0.13.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:bitcoin:bitcoind:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD637BBB-45AB-4DC3-A048-DCBD894CE390", "versionEndExcluding": "0.13.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Bitcoin Core before v0.13.0 allows denial of service (memory exhaustion) triggered by the remote network alert system (deprecated since Q1 2016) if an attacker can sign a message with a certain private key that had been known by unintended actors, because of an infinitely sized map. This affects other uses of the codebase, such as Bitcoin Knots before v0.13.0.knots20160814 and many altcoins."}, {"lang": "es", "value": "Bitcoin Core en versiones anteriores a la v0.13.0 permite una denegaci\u00f3n de servicio (DoS) desencadenada por el sistema de alertas de red remoto (obsoleto desde el primer trimestre de 2016) si un atacante puede firmar un mensaje con una clave privada determinada que sea conocida por actores no planeados debido a un mapa de tama\u00f1o infinito. Esto afecta a otros usos del c\u00f3digo base, como Bitcoin Knots en versiones anteriores a la v0.13.0.knots20160814 y otros altcoins."}], "id": "CVE-2016-10724", "lastModified": "2024-11-21T02:44:35.993", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-07-05T22:29:00.233", "references": [{"source": "cve@mitre.org", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"}, {"source": "cve@mitre.org", "url": "https://github.com/JinBean/CVE-Extension"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bitcoin.org/en/posts/alert-key-and-vulnerabilities-disclosure"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/JinBean/CVE-Extension"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-July/016189.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-400"}], "source": "nvd@nist.gov", "type": "Primary"}]}