Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
References
Link | Resource |
---|---|
https://github.com/ethereum/py-evm/issues/1448 | Exploit Third Party Advisory |
https://twitter.com/AlexanderFisher/status/1060923428641878019 | Third Party Advisory |
https://twitter.com/NettaLab/status/1060889400102383617 | Third Party Advisory |
https://www.reddit.com/r/ethereum/comments/9vkk2g/netta_labs_claim_to_have_found_a_vulnerability_in/e9d3wyx/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-11-12T02:00:00
Updated: 2018-11-12T02:57:01
Reserved: 2018-11-03T00:00:00
Link: CVE-2018-18920
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-11-12T02:29:00.233
Modified: 2019-02-04T13:31:03.050
Link: CVE-2018-18920
JSON object: View
Redhat Information
No data.
CWE