Unknown
CVE-2023-42443
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-42443
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In version 0.3.9 and prior, under certain conditions, the memory used by the builtins raw_call
, create_from_blueprint
and create_copy_of
can be corrupted. For raw_call
, the argument buffer of the call can be corrupted, leading to incorrect calldata
in the sub-context. For create_from_blueprint
and create_copy_of
, the buffer for the to-be-deployed bytecode can be corrupted, leading to deploying incorrect bytecode.
Each builtin has conditions that must be fulfilled for the corruption to happen. For raw_call
, the data
argument of the builtin must be msg.data
and the value
or gas
passed to the builtin must be some complex expression that results in writing to the memory. For create_copy_of
, the value
or salt
passed to the builtin must be some complex expression that results in writing to the memory. For create_from_blueprint
, either no constructor parameters should be passed to the builtin or raw_args
should be set to True, and the value
or salt
passed to the builtin must be some complex expression that results in writing to the memory.
As of time of publication, no patched version exists. The issue is still being investigated, and there might be other cases where the corruption might happen. When the builtin is being called from an internal
function F
, the issue is not present provided that the function calling F
wrote to memory before calling F
. As a workaround, the complex expressions that are being passed as kwargs to the builtin should be cached in memory prior to the call to the builtin.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: