Memory Allocation with Excessive Size Value Affecting evm-core package, versions <0.21.1>=0.23.0 <0.23.1>=0.24.0 <0.24.1>=0.25.0 <0.25.1>=0.26.0 <0.26.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-EVMCORE-5707471
  • published14 Jun 2023
  • disclosed25 Aug 2021
  • creditUnknown

Introduced: 25 Aug 2021

CVE-2021-29511  (opens in a new tab)
CWE-789  (opens in a new tab)

How to fix?

Upgrade evm-core to version 0.21.1, 0.23.1, 0.24.1, 0.25.1, 0.26.1 or higher.

Overview

Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value such that when executing specific EVM opcodes related to memory operations that use evm_core::Memory::copy_large, the crate can over-allocate memory when it is not needed, making it possible for an attacker to perform a denial-of-service attack.

CVSS Scores

version 3.1