[bitcoin-dev] Script Abuse Potential?
jlrubin at mit.edu
Tue Jan 3 03:27:44 UTC 2017
It is an unfortunate script, but can't actually
. The MAX_SCRIPT_ELEMENT_SIZE = 520 Bytes.
Thus, it would seem the worst you could do with this would be to
bytes ~=~ 10 MB.
Much more concerning would be the op_dup/op_cat style bug, which under a
similar script would certainly cause out of memory errors :)
On Mon, Jan 2, 2017 at 4:39 PM, Steve Davis via bitcoin-dev <
bitcoin-dev at lists.linuxfoundation.org> wrote:
> Hi all,
> Suppose someone were to use the following pk_script:
> [op_2dup, op_2dup, op_2dup, op_2dup, op_2dup, ...(to limit)...,
> op_2dup, op_hash160, <addr_hash>, op_equalverify, op_checksig]
> This still seems to be valid AFAICS, and may be a potential attack vector?
> bitcoin-dev mailing list
> bitcoin-dev at lists.linuxfoundation.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the bitcoin-dev