Описание
Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
Ссылки
- ExploitThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:ethereum:py-evm:0.2.0:alpha.33:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.0075
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-119
Связанные уязвимости
CVSS3: 8.8
debian
около 7 лет назад
Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode ...
CVSS3: 8.8
github
около 7 лет назад
Py-EVM is vulnerable to arbitrary bytecode injection
EPSS
Процентиль: 73%
0.0075
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-119