The Bitcoin Proof-of-Work algorithm does not consider a certain attack methodology related to 80-byte block headers with a variety of initial 64-byte chunks followed by the same 16-byte chunk, multiple candidate root values ending with the same 4 bytes, and calculations involving sqrt numbers. This violates the security assumptions of (1) the choice of input, outside of the dedicated nonce area, fed into the Proof-of-Work function should not change its difficulty to evaluate and (2) every Proof-of-Work function execution should be independent. NOTE: a number of persons feel that this methodology is a benign mining optimization, not a vulnerability
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:02:43.380Z
Reserved: 2017-05-24T00:00:00
Link: CVE-2017-9230
Updated: 2024-08-05T17:02:43.380Z
Status : Deferred
Published: 2017-05-24T16:29:00.180
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-9230
No data.
OpenCVE Enrichment
No data.
Weaknesses