Close Menu
    Facebook X (Twitter) Instagram
    ESP Blockchain Journal
    • Noticias
      • Noticias Blockchain
      • Noticias Bitcoin
      • Noticias Ethereum
      • Noticias Ripple
      • NFT
      • Metaverso
      • DeFi
      • Noticias Tron
      • Noticias Litecoin
      • Noticias Monero
      • Noticias Cardano
      • Noticias Stellar
      • Noticias Algorand
      • Noticias Dogecoin
      • Noticias Polkadot
      • Noticias Kusama
      • Noticias Solana
      • Opinión
    • Análisis de Precios
    • Academia Cripto
    • Contacto
    • bandera
    ESP Blockchain Journal
    Home»Noticias»Details of vulnerability

    Details of vulnerability

    0
    By BlockchainJournal on septiembre 28, 2019 Noticias
    Share
    Facebook Twitter LinkedIn Pinterest Email

    discovered in Lightning Network became known

    Blockstream developer Rusty Russell has revealed more details about the Lightning Network vulnerability, which first became known in late August.

    ICYMI: Here are all the details of the recent Lightning bug. https://t.co/NVzKmGW5I6

    – TheRustyTwit (@rusty_twit) September 27, 2019

    As Russell wrote, the vulnerability arose during the creation and replenishment of Lightning Network channels. In particular, when creating a channel, the recipient did not need to verify the transaction output amount used to replenish the channel, or use the scriptpubkey script, which allows you to verify that certain conditions are met before spending the output.

    The Lightning Network at the protocol level does not require such verification, and for this reason the attack organizer was able to inform about the opening of the channel without transferring payment to the recipient or transferring an incomplete amount.

    As a result, the attacker could spend the funds in the channel without notifying the other side. Only after closing the channel did the latter discover that the transactions transmitted through it were invalid.

    In mid-September, the developers recognized that the vulnerability was used in real conditions, without specifying the extent of the possible damage.

    Earlier in September, the technical director of Lightning Labs and ACINQ, Olaoluwa Osuntokun, confirmed the cases of practical exploitation of the discovered vulnerability.

    The following releases are still considered vulnerable:

    LND version 0.7 and below;
    c-lightning version 0.7 and below;
    eclair version 0.3 and below.

    In this regard, developers of the main Lightning Network clients again remind about the need to upgrade to the latest versions. Special tools ( Lightning Labs and Acinq ) were also released to determine if the attack affected users.

    Recall that earlier this week the number of active Lightning nodes in the bitcoin network exceeded 10,000 .

    Follow BlockchainJournal on Twitter !

    << aside id = "unisender_subscribe_form-10" class = "widget unisender_form">

    BlockchainJournal.news

    BlockchainJournal.news

    bitcoin BlockStream Featured Lightning Network Network Twitter
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    BlockchainJournal

    Related Posts

    Hyperliquid pide propuestas para lanzar USDH en medio de objeciones por equidad en la gobernanza

    septiembre 5, 2025

    SharpLink explorará el staking de parte de su tesorería en Ethereum en la red Linea

    septiembre 5, 2025

    Strategy Inc. enfrenta obstáculos para entrar al S&P 500 por su volatilidad y dependencia de Bitcoin

    septiembre 5, 2025

    Wallet Antigua despierta: 479 BTC (52 millones USD) movidos tras 13 años

    septiembre 5, 2025

    World Liberty Financial bloquea la wallet de Justin Sun en medio de la polémica por WLFI

    septiembre 4, 2025

    SEC apuesta por una agenda pro-cripto con una serie de rulemakings sobre activos digitales

    septiembre 4, 2025
    Buscar
    Facebook X (Twitter) Instagram Pinterest
    © 2025 Blockchainjournal

    Type above and press Enter to search. Press Esc to cancel.

    Utilizamos cookies para asegurar que damos la mejor experiencia al usuario en nuestra web. Si sigues utilizando este sitio asumiremos que estás de acuerdo.