A heap-based buffer overflow exists in rippled before 1.8.5. The vulnerability allows attackers to cause a crash or execute commands remotely on a rippled node, which may lead to XRPL mainnet DoS or compromise. This exposes all digital assets on the XRPL to a security threat.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://ripple.com/ | vendor advisory |
https://github.com/ripple/rippled/compare/1.8.4...1.8.5 | third party advisory patch |
https://xrpl.org/blog/2022/rippled-1.8.5.html | third party advisory release notes |