Lucene search

K
cve[email protected]CVE-2024-22419
HistoryJan 18, 2024 - 7:15 p.m.

CVE-2024-22419

2024-01-1819:15:10
CWE-787
CWE-120
web.nvd.nist.gov
97
vyper
smart contract language
ethereum virtual machine
cve-2024-22419
buffer overflow
memory allocation
vulnerability
security patch
update advised

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%

Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The concat built-in can write over the bounds of the memory buffer that was allocated for it and thus overwrite existing valid data. The root cause is that the build_IR for concat doesn’t properly adhere to the API of copy functions (for >=0.3.2 the copy_bytes function). A contract search was performed and no vulnerable contracts were found in production. The buffer overflow can result in the change of semantics of the contract. The overflow is length-dependent and thus it might go unnoticed during contract testing. However, certainly not all usages of concat will result in overwritten valid data as we require it to be in an internal function and close to the return statement where other memory allocations don’t occur. This issue has been addressed in commit 55e18f6d1 which will be included in future releases. Users are advised to update when possible.

Affected configurations

Vulners
NVD
Node
vyperlangvyperRange0.3.10
VendorProductVersionCPE
vyperlangvyper*cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "vyperlang",
    "product": "vyper",
    "versions": [
      {
        "version": "<= 0.3.10",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%

Related for CVE-2024-22419