CVE-2024-26149

Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an excessively large value is specified as the starting index for an array in `_abi_decode`, it can cause the read position to overflow. This results in the decoding of values outside the intended array bounds, potentially leading to exploitations in contracts that use arrays within `_abi_decode`. This vulnerability affects 0.3.10 and earlier versions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

History

16 Jan 2025, 19:31

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Vyperlang vyper
Vyperlang
CPE cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*
References () https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w - () https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w - Exploit, Patch, Vendor Advisory

Information

Published : 2024-02-26 20:19

Updated : 2025-01-16 19:31


NVD link : CVE-2024-26149

Mitre link : CVE-2024-26149

CVE.ORG link : CVE-2024-26149


JSON object : View

Products Affected

vyperlang

  • vyper
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

NVD-CWE-noinfo