-
CVSS Score
-The vulnerability stems from missing pointer validation during ABI decoding. The commit added 'validate_pointers' checks to prevent pointers from referencing invalid locations (either within the offsets section or beyond data boundaries). The affected functions (HeadTailDecoder, TupleDecoder, and array decoders) previously processed pointers without these safety checks, allowing attackers to craft payloads with recursive pointer patterns that would cause stack overflows or excessive resource consumption during decoding. The high confidence comes from the explicit addition of validation logic in these exact locations in the patch.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| eth-abi | pip | <= 5.0.0 | 5.0.1 |
A Semantic Attack on Google Gemini - Read the Latest Research