Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0118 | Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '\"stack\": [100, 100, 0]' where b'\\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to \"smart contracts can be executed indefinitely without gas being paid.\" |
Github GHSA |
GHSA-vqgp-4jgj-5j64 | Py-EVM is vulnerable to arbitrary bytecode injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:23:08.555Z
Reserved: 2018-11-03T00:00:00
Link: CVE-2018-18920
No data.
Status : Modified
Published: 2018-11-12T02:29:00.233
Modified: 2024-11-21T03:56:52.257
Link: CVE-2018-18920
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA