Unchecked Return Value Affecting vyper package, versions [,0.3.10rc1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-VYPER-5805377
  • published26 Jul 2023
  • disclosed26 Jul 2023
  • creditUnknown

Introduced: 26 Jul 2023

CVE-2023-37902  (opens in a new tab)
CWE-252  (opens in a new tab)

How to fix?

Upgrade vyper to version 0.3.10rc1 or higher.

Overview

vyper is a Pythonic Smart Contract Language for the EVM.

Affected versions of this package are vulnerable to Unchecked Return Value such that the ecrecover precompile does not fill the output buffer if the signature does not verify. However, the ecrecover builtin will still return whatever is at memory location 0. This means that if the compiler has been convinced to write to the 0 memory location with specially crafted data (generally, this can happen with a hashmap access or immutable read) just before the ecrecover, a signature check might pass on an invalid signature.

References

CVSS Scores

version 3.1