1 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid." Py-EVM v0.2.0-alpha.33 permite a los atacantes hacer una llamada vm.execute_bytecode que desencadena computation._stack.values con '"stack": 100, 100, 0]' donde se esperaba b'\x', resultando en un fallo de ejecución debido a un opcode no válido. • https://github.com/ethereum/py-evm/issues/1448 https://twitter.com/AlexanderFisher/status/1060923428641878019 https://twitter.com/NettaLab/status/1060889400102383617 https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •