delvingbitcoin
DoS Disclosure: LND Onion Bomb
Posted on: June 18, 2024 17:48 UTC
Lightning Network Daemon (LND) versions earlier than 0.17.0 have been identified as vulnerable to a Denial of Service (DoS) attack that can lead to an out-of-memory (OOM) condition, causing the affected node to crash.
This vulnerability stems from LND's handling of onion payloads, where there was no proper bounds checking on the decoded length of these payloads. Malicious actors could exploit this by setting the payload length to up to 4 GB, prompting LND to allocate corresponding memory for decoding, which could quickly exhaust the system's available memory and crash the node. The nature of onion routing makes it easy to conceal the source of such attacks, adding to the risk.
To mitigate this issue and safeguard nodes against potential exploitation, it is crucial for operators of LND nodes running versions older than 0.17.0 to update their software to version 0.17.0 or later. The updated version introduces a bounds check for onion payload lengths, effectively preventing the allocation of excessive memory and protecting nodes from the described DoS attack. For detailed information about the vulnerability, its implications, and further technical details, interested parties are encouraged to consult the comprehensive blog post dedicated to this topic. This source offers an in-depth exploration of the root causes and preventive measures related to the vulnerability.