CVE-2024-27094

Source
https://cve.org/CVERecord?id=CVE-2024-27094
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27094.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27094
Aliases
Published
2024-02-29T18:18:24.721Z
Modified
2026-02-05T09:40:08.361131Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H CVSS Calculator
Summary
OpenZeppelin Contracts base64 encoding may read from potentially dirty memory
Details

OpenZeppelin Contracts is a library for secure smart contract development. The Base64.encode function encodes a bytes input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer. The vulnerability is fixed in 5.0.2 and 4.9.6.

Database specific
{
    "cwe_ids": [
        "CWE-125"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27094.json"
}
References

Affected packages

Git
github.com/openzeppelin/openzeppelin-contracts

Affected versions

v5.*
v5.0.0
v5.0.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27094.json"
github.com/openzeppelin/openzeppelin-contracts-upgradeable

Affected versions

v5.*
v5.0.0
v5.0.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27094.json"