← Volver a CVEs
CVE-2024-24561
CRITICAL9.8
Descripcion
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.10 and earlier, the bounds check for slices does not account for the ability for start + length to overflow when the values aren't literals. If a slice() function uses a non-literal argument for the start or length variable, this creates the ability for an attacker to overflow the bounds check. This issue can be used to do OOB access to storage, memory or calldata addresses. It can also be used to corrupt the length slot of the respective array.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/1/2024
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
vyperlang:vyper
Debilidades (CWE)
CWE-119CWE-787
Referencias
https://github.com/vyperlang/vyper/blob/b01cd686aa567b32498fefd76bd96b0597c6f099/vyper/builtins/functions.py#L404-L457(security-advisories@github.com)
https://github.com/vyperlang/vyper/issues/3756(security-advisories@github.com)
https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c(security-advisories@github.com)
https://github.com/vyperlang/vyper/blob/b01cd686aa567b32498fefd76bd96b0597c6f099/vyper/builtins/functions.py#L404-L457(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/vyperlang/vyper/issues/3756(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.