The maxRandom function of a smart contract implementation for All For One, an Ethereum gambling game, generates a random value with publicly readable variables because the _seed value can be retrieved with a getStorageAt call. Therefore, it allows attackers to always win and get rewards.
References
Configurations
History
21 Nov 2024, 03:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682%40%3Cnotifications.zookeeper.apache.org%3E - | |
References | () https://medium.com/%40jonghyk.song/to-be-a-winner-of-ethereum-gambling-game-all-for-one-by-breaking-prng-1ab011163d40 - |
Information
Published : 2018-08-15 17:29
Updated : 2024-11-21 03:44
NVD link : CVE-2018-12056
Mitre link : CVE-2018-12056
CVE.ORG link : CVE-2018-12056
JSON object : View
Products Affected
all-for-one
- all_for_one
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)