Bitcoin Forum
March 01, 2024, 02:46:39 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Alternate cryptocurrencies / Altcoin Discussion / Ether geth and Mist wallet: security updates on: May 17, 2016, 09:23:56 PM
Security Alert Geth suffers from a very low probable DoS attack vector Update immediately
Posted by Jeffrey Wilcke on May 17th, 2016.
Affected configurations: All Go client versions

Likelihood: Very low

Severity: High

Details: A bug in Geth (and potentially other clients) may suffer from a DoS attack and allows remote attackers to stall synchronisation process almost indefinitely by supplying a valid, lighter chain. More information will be given out a later time including the report that was submitted through the bug bounty program.

Effects on expected chain reorganisation depth: None

Proposed temporary workaround: None

Remedial action taken by Ethereum: Provision of hotfixes as below:



Wallet 0.7.4 (Beta 18)
@alexvandesande alexvandesande released this 8 days ago 67 commits to master since this release

This is a security release. The details on the security issues are described on this blog post.

This is the first release to include geth 1.4 wich should come with some performance improvements and connection fixes.

Best wishes to all Ether fans!
bitfish  Roll Eyes
2  Other / Beginners & Help / Warning for Linux users running bitcoind, litecoind, xxxcoind... on: May 24, 2013, 05:18:22 PM
If you are running bitcoind, litecoind or any other coin daemon from the command line,
you better check your .bash_history file (and .viminfo file, if you are using vim editor)
for wallet password leaks.

Your wallet encryption isn't worth a dime if your wallet password is stored in one of those files above.

Put the line


into your .bashrc file preventing bash shell from remembering you wallet password and other password strings.


Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!