CVE-2018-18920
 
Severity Score
8.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
Py-EVM v0.2.0-alpha.33 permite a los atacantes hacer una llamada vm.execute_bytecode que desencadena computation._stack.values con '"stack": 100, 100, 0]' donde se esperaba b'\x', resultando en un fallo de ejecución debido a un opcode no válido. Esto se relaciona con "smart contracts can be executed indefinitely without gas being paid".
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-11-03 CVE Reserved
- 2018-11-12 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-10-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://twitter.com/AlexanderFisher/status/1060923428641878019 | Third Party Advisory | |
https://twitter.com/NettaLab/status/1060889400102383617 | Third Party Advisory | |
https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/ethereum/py-evm/issues/1448 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|