CVE-2018-10376

An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets via crafted _fee and _value parameters, as exploited in the wild in April 2018, aka the "proxyOverflow" issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartmesh:smartmesh:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () https://dasp.co/#item-3 - Not Applicable () https://dasp.co/#item-3 - Not Applicable
References () https://peckshield.com/2018/04/25/proxyOverflow/ - Exploit, Third Party Advisory () https://peckshield.com/2018/04/25/proxyOverflow/ - Exploit, Third Party Advisory
References () https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/ - Exploit, Third Party Advisory () https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/ - Exploit, Third Party Advisory

Information

Published : 2018-04-25 09:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10376

Mitre link : CVE-2018-10376

CVE.ORG link : CVE-2018-10376


JSON object : View

Products Affected

smartmesh

  • smartmesh
CWE
CWE-190

Integer Overflow or Wraparound