CVE-2018-25098

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in blockmason credit-protocol. It has been declared as problematic. Affected by this vulnerability is the function executeUcacTx of the file contracts/CreditProtocol.sol of the component UCAC Handler. The manipulation leads to denial of service. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 082e01f18707ef995e80ebe97fcedb229a55efc5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-252799. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:blockmason:credit-protocol:*:*:*:*:*:*:*:*

History

13 Feb 2024, 00:39

Type Values Removed Values Added
CPE cpe:2.3:a:blockmason:credit-protocol:*:*:*:*:*:*:*:*
CVSS v2 : 3.3
v3 : 4.3
v2 : 3.3
v3 : 7.5
CWE CWE-672
First Time Blockmason
Blockmason credit-protocol
References () https://github.com/blockmason/credit-protocol/commit/082e01f18707ef995e80ebe97fcedb229a55efc5 - () https://github.com/blockmason/credit-protocol/commit/082e01f18707ef995e80ebe97fcedb229a55efc5 - Patch
References () https://github.com/blockmason/credit-protocol/pull/33 - () https://github.com/blockmason/credit-protocol/pull/33 - Issue Tracking, Patch
References () https://vuldb.com/?ctiid.252799 - () https://vuldb.com/?ctiid.252799 - Permissions Required
References () https://vuldb.com/?id.252799 - () https://vuldb.com/?id.252799 - Third Party Advisory

04 Feb 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-04 17:15

Updated : 2024-07-05 18:15


NVD link : CVE-2018-25098

Mitre link : CVE-2018-25098

CVE.ORG link : CVE-2018-25098


JSON object : View

Products Affected

blockmason

  • credit-protocol
CWE
CWE-672

Operation on a Resource after Expiration or Release

CWE-404

Improper Resource Shutdown or Release