An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-8645 An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
Github GHSA Github GHSA GHSA-wq32-8rp4-w2mc Nethermind Juno Potential Denial of Service (DoS) via Integer Overflow
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Apr 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Nethermind
Nethermind juno
CPEs cpe:2.3:a:nethermind:juno:*:*:*:*:*:*:*:*
Vendors & Products Nethermind
Nethermind juno

Fri, 28 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-190
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Description An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-28T15:16:08.128Z

Reserved: 2025-03-11T00:00:00.000Z

Link: CVE-2025-29072

cve-icon Vulnrichment

Updated: 2025-03-28T15:14:51.769Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-27T16:15:30.903

Modified: 2025-04-11T17:20:02.963

Link: CVE-2025-29072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.