Описание
evm is a pure Rust implementation of Ethereum Virtual Machine. Prior to the patch, when executing specific EVM opcodes related to memory operations that use evm_core::Memory::copy_large, the evm crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack. The flaw was corrected in commit 19ade85. Users should upgrade to ==0.21.1, ==0.23.1, ==0.24.1, ==0.25.1, >=0.26.1. There are no workarounds. Please upgrade your evm crate version.
Ссылки
- Third Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.21.0 (включая)
Одно из
cpe:2.3:a:evm_project:evm:*:*:*:*:*:rust:*:*
cpe:2.3:a:evm_project:evm:0.22.0:*:*:*:*:rust:*:*
cpe:2.3:a:evm_project:evm:0.23.0:*:*:*:*:rust:*:*
cpe:2.3:a:evm_project:evm:0.24.0:*:*:*:*:rust:*:*
cpe:2.3:a:evm_project:evm:0.25.0:*:*:*:*:rust:*:*
cpe:2.3:a:evm_project:evm:0.26.0:*:*:*:*:rust:*:*
EPSS
Процентиль: 59%
0.00376
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-770
CWE-787
Связанные уязвимости
EPSS
Процентиль: 59%
0.00376
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-770
CWE-787