Py-EVM v0.2.0-alpha.33 allows malicious users to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ethereum py-evm 0.2.0 |