Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0118 Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '\"stack\": [100, 100, 0]' where b'\\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to \"smart contracts can be executed indefinitely without gas being paid.\"
Github GHSA Github GHSA GHSA-vqgp-4jgj-5j64 Py-EVM is vulnerable to arbitrary bytecode injection
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:23:08.555Z

Reserved: 2018-11-03T00:00:00

Link: CVE-2018-18920

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-12T02:29:00.233

Modified: 2024-11-21T03:56:52.257

Link: CVE-2018-18920

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.