Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an excessively large value is specified as the starting index for an array in `_abi_decode`, it can cause the read position to overflow. This results in the decoding of values outside the intended array bounds, potentially leading to exploitations in contracts that use arrays within `_abi_decode`. This vulnerability affects 0.3.10 and earlier versions.
References
Link | Resource |
---|---|
https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w | Exploit Patch Vendor Advisory |
https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w | Exploit Patch Vendor Advisory |
Configurations
History
16 Jan 2025, 19:31
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Vyperlang vyper
Vyperlang |
|
CPE | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:* | |
References | () https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w - Exploit, Patch, Vendor Advisory |
Information
Published : 2024-02-26 20:19
Updated : 2025-01-16 19:31
NVD link : CVE-2024-26149
Mitre link : CVE-2024-26149
CVE.ORG link : CVE-2024-26149
JSON object : View
Products Affected
vyperlang
- vyper
CWE