Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0118 | Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '\"stack\": [100, 100, 0]' where b'\\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to \"smart contracts can be executed indefinitely without gas being paid.\" |
Github GHSA |
GHSA-vqgp-4jgj-5j64 | Py-EVM is vulnerable to arbitrary bytecode injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:23:08.555Z
Reserved: 2018-11-03T00:00:00
Link: CVE-2018-18920
No data.
Status : Modified
Published: 2018-11-12T02:29:00.233
Modified: 2024-11-21T03:56:52.257
Link: CVE-2018-18920
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA