CVE-2023-41052
CVSS 3.1 Score 5.3 of 10 (medium)
Details
Summary
CVE-2023-41052 affects Vyper, a Pythonic Smart Contract Language. In affected versions, the order of evaluation for the arguments of certain built-in functions, specifically `uint256_addmod`, `uint256_mulmod`, `ecadd`, and `ecmul`, does not follow source order. This issue creates a problem when the evaluation of one argument generates side effects that other arguments depend on. A patch is currently under development on pull request #3583. To mitigate this vulnerability, users should ensure that the arguments of expressions using the listed built-ins do not generate side effects, or if one does, that no other argument depends on those side effects.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- Vyperlang Vyper