Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order. This behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on. A patch is currently being developed on pull request #3583. When using builtins from the list above, users should make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.
References
Link | Resource |
---|---|
https://github.com/vyperlang/vyper/pull/3583 | Patch |
https://github.com/vyperlang/vyper/security/advisories/GHSA-4hg4-9mf5-wxxq | Exploit Patch Third Party Advisory |
Configurations
History
08 Sep 2023, 14:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Vyperlang vyper
Vyperlang |
|
References | (MISC) https://github.com/vyperlang/vyper/pull/3583 - Patch | |
References | (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-4hg4-9mf5-wxxq - Exploit, Patch, Third Party Advisory |
04 Sep 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-04 18:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-41052
Mitre link : CVE-2023-41052
CVE.ORG link : CVE-2023-41052
JSON object : View
Products Affected
vyperlang
- vyper
CWE
CWE-670
Always-Incorrect Control Flow Implementation