The Move language references the security module integer overflow vulnerability threatening code security.

Move language reference security module has an integer overflow vulnerability

Recently, a serious integer overflow vulnerability has been discovered in the reference safety module of the Move language. This vulnerability could lead to denial of service attacks and poses a potential threat to the security of the Move language.

The Move language performs code verification before executing bytecode, which is divided into multiple steps. This vulnerability occurs in the reference_safety step, which is responsible for verifying the safety of references, including checking for dangling references and whether mutable reference access is safe.

Numen Cyber exclusively discovered another critical vulnerability in the move language

The root of the vulnerability lies in an integer overflow issue in the security module. When the sum of the number of function parameters and local variables exceeds 256, the use of the u8 type to iterate over local variables can lead to an integer overflow. This overflow may be exploited to bypass security checks, ultimately resulting in a denial of service attack.

Numen Cyber exclusively discovered another critical vulnerability in the move language

Specifically, the vulnerability exploitation process is as follows:

  1. Construct a Move code block that contains a loop to execute it multiple times.

  2. Set a large number of function parameters and local variables, making their total exceed 256.

  3. During the first execution, due to integer overflow, the length of the new locals map will become a very small value.

  4. Attempting to access a non-existent local variable index during subsequent execution causes panic and program crash.

Numen Cyber exclusive discovery of another high-risk vulnerability in the move language

This vulnerability exposes that even languages like Move, which prioritize security, may have overlooked security risks. It reminds us of the importance of code auditing and the need for more comprehensive security considerations in language design.

Numen Cyber exclusive discovery of another high-risk vulnerability in the move language

For users and developers of the Move language, it is recommended to closely monitor official security updates. At the same time, when writing Move code, pay attention to controlling the number of function parameters and local variables to avoid triggering such boundary situations.

Numen Cyber's exclusive discovery of another high-risk vulnerability in the move language

From a more macro perspective, this vulnerability also reflects that relying solely on static verification may be insufficient to ensure complete security. In the future, the Move language may need to incorporate more dynamic checks at runtime to prevent similar security issues.

Numen Cyber exclusive discovery of another critical vulnerability in the move language

Overall, the discovery of this vulnerability once again proves the importance of ongoing security research in enhancing the safety of blockchain technology. As the application of the Move language continues to expand in the Web3 space, we look forward to seeing more security improvements introduced to build a more robust and reliable smart contract ecosystem.

Numen Cyber exclusive discovery of another critical vulnerability in the move language

Numen Cyber exclusive discovery of another critical vulnerability in move language

Numen Cyber exclusive discovery of another high-risk vulnerability in move language

Numen Cyber exclusive discovery of another high-risk vulnerability in the move language

Numen Cyber exclusive discovery of another high-risk vulnerability in the move language

Numen Cyber Exclusive Discovery of Another High-Risk Vulnerability in Move Language

Numen Cyber exclusively discovered another critical vulnerability in the move language

Numen Cyber exclusive discovery of another high-risk vulnerability in the move language

Numen Cyber Exclusive Discovery: Another High-Risk Vulnerability in Move Language

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 9
  • Share
Comment
0/400
FUDwatchervip
· 07-11 15:51
I was still talking about the losses from the overflow last week.
View OriginalReply0
PriceOracleFairyvip
· 07-10 20:42
omg move getting rekt by basic u8 overflow... how did auditors miss this smh
Reply0
ImpermanentLossEnjoyervip
· 07-08 18:08
move this also crashed, right?
View OriginalReply0
FastLeavervip
· 07-08 18:00
To be honest, move has gone G this time.
View OriginalReply0
UnluckyLemurvip
· 07-08 17:59
move this is really unbearable ah
View OriginalReply0
HackerWhoCaresvip
· 07-08 17:58
Too weak 8, can even overflow.
View OriginalReply0
TerraNeverForgetvip
· 07-08 17:58
Sigh, move also crashed.
View OriginalReply0
AirdropHunter420vip
· 07-08 17:57
Another 0day has been released.
View OriginalReply0
Ser_Liquidatedvip
· 07-08 17:50
This is a zero-day vulnerability.
View OriginalReply0
View More
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)