A heap-based buffer overflow exists in rippled before 1.8.5. The vulnerability allows attackers to cause a crash or execute commands remotely on a rippled node, which may lead to XRPL mainnet DoS or compromise. This exposes all digital assets on the XRPL to a security threat.
[
{
"source": "https://github.com/ripple/rippled/commit/72377e7bf25c4eaee5174186d2db3c6b4210946f",
"target": {
"file": "src/ripple/protocol/impl/BuildInfo.cpp"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-29077-d0b8310c",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"210707397357993739812613116987614333685",
"307464896027562437958032019526306783295",
"296022353296152264758262536646395275237",
"199657875885241300211392053013559564544"
]
}
}
]