Skip to content

DoS via malicious p2p message

High
andrepatta published GHSA-7ww4-x27h-p6hf Oct 9, 2025

Package

gomod github.com/microstack-tech/parallax (Go)

Affected versions

< 0.1.4

Patched versions

>= 0.1.4

Description

Impact

A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node.

Details

The p2p handler spawned a new goroutine to respond to ping requests. By flooding a node with ping requests, an unbounded number of goroutines can be created, leading to resource exhaustion and potentially crash due to OOM.

Patches

The fix is included in the Parallax client version 0.1.4 and onwards.

Fixed by cc4b24e

Workarounds

No known workarounds.

Credits

This bug was reported by Patrick McHardy and reported via [email protected].

References

Severity

High

CVE ID

CVE-2023-40591

Weaknesses

No CWEs