A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards.
References
Link | Resource |
---|---|
https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17877 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-10-23T21:00:00
Updated: 2018-10-23T20:57:01
Reserved: 2018-10-01T00:00:00
Link: CVE-2018-17877
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-10-23T21:30:53.657
Modified: 2018-12-08T02:15:54.447
Link: CVE-2018-17877
JSON object: View
Redhat Information
No data.
CWE