CVE-2014-4503
Description
The parse_notify function in util.c in sgminer before 4.2.2 and cgminer 3.3.0 through 4.0.1 allows man-in-the-middle attackers to cause a denial of service (application exit) via a crafted (1) bbversion, (2) prev_hash, (3) nbit, or (4) ntime parameter in a mining.notify action stratum message.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A man-in-the-middle attacker can crash sgminer or cgminer by sending malformed parameters in a stratum mining.notify message.
Vulnerability
The parse_notify function in util.c of sgminer before version 4.2.2 and cgminer versions 3.3.0 through 4.0.1 does not properly validate certain parameters received in a mining.notify Stratum message. Specifically, the function calls quit or quithere when it encounters an invalid hex string for the bbversion, prev_hash, nbit, or ntime parameters, causing the application to exit [1]. The fix in sgminer commit [2] replaces the fatal exit with a warning and pool failure handling.
Exploitation
An attacker who can perform a man-in-the-middle attack on a valid Stratum connection between the miner and the mining pool can send a crafted mining.notify message containing an invalid hex string for any of the four parameters (bbversion, prev_hash, nbit, ntime). No authentication or special privileges are required beyond network position to intercept and modify the traffic [1].
Impact
Successful exploitation causes the miner application to immediately exit, resulting in a denial of service. The miner stops mining until restarted. No data is compromised, and no code execution is achieved; the impact is limited to availability [1].
Mitigation
The vulnerability is fixed in sgminer version 4.2.2 and later [2]. For cgminer, users should upgrade to a version that includes the fix (the commit references sgminer, but cgminer may have a similar fix; check vendor). If upgrading is not possible, ensure the Stratum connection is secured against man-in-the-middle attacks (e.g., using TLS). No workaround within the application itself is available [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
43(expand)+ 1 more
- (no CPE)
- (no CPE)range: <4.2.2
cpe:2.3:a:cgminer_project:cgminer:3.10.0:*:*:*:*:*:*:*+ 33 more
- cpe:2.3:a:cgminer_project:cgminer:3.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:3.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:cgminer_project:cgminer:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sgminer_project:sgminer:*:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:sgminer_project:sgminer:*:*:*:*:*:*:*:*range: <=4.2.1
- cpe:2.3:a:sgminer_project:sgminer:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:sgminer_project:sgminer:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:sgminer_project:sgminer:4.1.153:*:*:*:*:*:*:*
- cpe:2.3:a:sgminer_project:sgminer:4.1.242:*:*:*:*:*:*:*
- cpe:2.3:a:sgminer_project:sgminer:4.1.271:*:*:*:*:*:*:*
- cpe:2.3:a:sgminer_project:sgminer:4.2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.