Vulnerability Details CVE-2024-32646
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code` and either the `start` or `length` arguments have side-effects. It can be easily triggered only with the versions `<0.3.4` as `0.3.4` introduced the unique symbol fence. No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.5%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2024-32646
-
cpe:2.3:a:vyperlang:vyper:0.0.4
-
cpe:2.3:a:vyperlang:vyper:0.1.0
-
cpe:2.3:a:vyperlang:vyper:0.2.0
-
cpe:2.3:a:vyperlang:vyper:0.2.1
-
cpe:2.3:a:vyperlang:vyper:0.2.10
-
cpe:2.3:a:vyperlang:vyper:0.2.11
-
cpe:2.3:a:vyperlang:vyper:0.2.12
-
cpe:2.3:a:vyperlang:vyper:0.2.13
-
cpe:2.3:a:vyperlang:vyper:0.2.14
-
cpe:2.3:a:vyperlang:vyper:0.2.15
-
cpe:2.3:a:vyperlang:vyper:0.2.16
-
cpe:2.3:a:vyperlang:vyper:0.2.2
-
cpe:2.3:a:vyperlang:vyper:0.2.3
-
cpe:2.3:a:vyperlang:vyper:0.2.4
-
cpe:2.3:a:vyperlang:vyper:0.2.5
-
cpe:2.3:a:vyperlang:vyper:0.2.6
-
cpe:2.3:a:vyperlang:vyper:0.2.7
-
cpe:2.3:a:vyperlang:vyper:0.2.8
-
cpe:2.3:a:vyperlang:vyper:0.2.9
-
cpe:2.3:a:vyperlang:vyper:0.3.0
-
cpe:2.3:a:vyperlang:vyper:0.3.1
-
cpe:2.3:a:vyperlang:vyper:0.3.10
-
cpe:2.3:a:vyperlang:vyper:0.3.2
-
cpe:2.3:a:vyperlang:vyper:0.3.3
-
cpe:2.3:a:vyperlang:vyper:0.3.4
-
cpe:2.3:a:vyperlang:vyper:0.3.5
-
cpe:2.3:a:vyperlang:vyper:0.3.6
-
cpe:2.3:a:vyperlang:vyper:0.3.7
-
cpe:2.3:a:vyperlang:vyper:0.3.8
-
cpe:2.3:a:vyperlang:vyper:0.3.9