CVE-2023-37902

MEDIUM

Vyper <0.3.10 - Memory Corruption

Title source: llm
STIX 2.1

Description

Vyper is a Pythonic programming language that targets the Ethereum Virtual Machine (EVM). Prior to version 0.3.10, the ecrecover precompile does not fill the output buffer if the signature does not verify. However, the ecrecover builtin will still return whatever is at memory location 0. This means that the if the compiler has been convinced to write to the 0 memory location with specially crafted data (generally, this can happen with a hashmap access or immutable read) just before the ecrecover, a signature check might pass on an invalid signature. Version 0.3.10 contains a patch for this issue.

Scores

CVSS v3 5.3
EPSS 0.0009
EPSS Percentile 25.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-252
Status published
Products (2)
pypi/vyper 0 - 0.3.10PyPI
vyperlang/vyper < 0.3.9
Published Jul 25, 2023
Tracked Since Feb 18, 2026