Lucene search

K
cve[email protected]CVE-2024-24564
HistoryFeb 26, 2024 - 8:19 p.m.

CVE-2024-24564

2024-02-2620:19:05
CWE-125
web.nvd.nist.gov
81
vyper
smart contract
ethereum
extract32
dirty memory
vulnerability
cve-2024-24564
nvd

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

4.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using the built-in extract32(b, start), if the start index provided has for side effect to update b, the byte array to extract 32 bytes from, it could be that some dirty memory is read and returned by extract32. This vulnerability affects 0.3.10 and earlier versions.

Affected configurations

Vulners
Node
vyperlangvyperRange0.3.10
VendorProductVersionCPE
vyperlangvyper*cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "vyperlang",
    "product": "vyper",
    "versions": [
      {
        "version": "<= 0.3.10",
        "status": "affected"
      }
    ]
  }
]

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

4.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CVE-2024-24564