Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
References
| Link | Resource |
|---|---|
| https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx/ | Third Party Advisory |
| https://twitter.com/NettaLab/status/1060889400102383617 | Third Party Advisory |
| https://twitter.com/AlexanderFisher/status/1060923428641878019 | Third Party Advisory |
| https://github.com/ethereum/py-evm/issues/1448 | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-11-11 18:29
Updated : 2019-02-04 05:31
NVD link : CVE-2018-18920
Mitre link : CVE-2018-18920
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
ethereum
- py-evm


