A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards.
References
Link Resource
https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-10-23T21:00:00

Updated: 2018-10-23T20:57:01

Reserved: 2018-10-01T00:00:00


Link: CVE-2018-17877

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-10-23T21:30:53.657

Modified: 2018-12-08T02:15:54.447


Link: CVE-2018-17877

JSON object: View

cve-icon Redhat Information

No data.

CWE