CVE-2023-42443

Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In version 0.3.9 and prior, under certain conditions, the memory used by the builtins `raw_call`, `create_from_blueprint` and `create_copy_of` can be corrupted. For `raw_call`, the argument buffer of the call can be corrupted, leading to incorrect `calldata` in the sub-context. For `create_from_blueprint` and `create_copy_of`, the buffer for the to-be-deployed bytecode can be corrupted, leading to deploying incorrect bytecode. Each builtin has conditions that must be fulfilled for the corruption to happen. For `raw_call`, the `data` argument of the builtin must be `msg.data` and the `value` or `gas` passed to the builtin must be some complex expression that results in writing to the memory. For `create_copy_of`, the `value` or `salt` passed to the builtin must be some complex expression that results in writing to the memory. For `create_from_blueprint`, either no constructor parameters should be passed to the builtin or `raw_args` should be set to True, and the `value` or `salt` passed to the builtin must be some complex expression that results in writing to the memory. As of time of publication, no patched version exists. The issue is still being investigated, and there might be other cases where the corruption might happen. When the builtin is being called from an `internal` function `F`, the issue is not present provided that the function calling `F` wrote to memory before calling `F`. As a workaround, the complex expressions that are being passed as kwargs to the builtin should be cached in memory prior to the call to the builtin.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

History

22 Sep 2023, 14:30

Type Values Removed Values Added
CPE cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*
References (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-c647-pxm2-c52w - (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-c647-pxm2-c52w - Exploit, Patch, Vendor Advisory
References (MISC) https://github.com/vyperlang/vyper/issues/3609 - (MISC) https://github.com/vyperlang/vyper/issues/3609 - Issue Tracking, Vendor Advisory
First Time Vyperlang
Vyperlang vyper
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

19 Sep 2023, 03:37

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-18 21:16

Updated : 2023-12-10 15:14


NVD link : CVE-2023-42443

Mitre link : CVE-2023-42443

CVE.ORG link : CVE-2023-42443


JSON object : View

Products Affected

vyperlang

  • vyper
CWE
CWE-787

Out-of-bounds Write