CVE-2024-26149
CVSS V2 None
CVSS V3 None
Description
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an excessively large value is specified as the starting index for an array in `_abi_decode`, it can cause the read position to overflow. This results in the decoding of values outside the intended array bounds, potentially leading to exploitations in contracts that use arrays within `_abi_decode`. This vulnerability affects 0.3.10 and earlier versions.
Overview
- CVE ID
- CVE-2024-26149
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-02-26T20:16:01.688Z
- Last Modified Date
- 2024-02-26T20:16:01.688Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w | x_refsource_CONFIRM |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-26149 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26149 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 00:27:51 | Added to TrackCVE |