CVE-2018-12056

The maxRandom function of a smart contract implementation for All For One, an Ethereum gambling game, generates a random value with publicly readable variables because the _seed value can be retrieved with a getStorageAt call. Therefore, it allows attackers to always win and get rewards.
Configurations

Configuration 1 (hide)

cpe:2.3:a:all-for-one:all_for_one:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:44

Type Values Removed Values Added
References () https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682%40%3Cnotifications.zookeeper.apache.org%3E - () https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682%40%3Cnotifications.zookeeper.apache.org%3E -
References () https://medium.com/%40jonghyk.song/to-be-a-winner-of-ethereum-gambling-game-all-for-one-by-breaking-prng-1ab011163d40 - () https://medium.com/%40jonghyk.song/to-be-a-winner-of-ethereum-gambling-game-all-for-one-by-breaking-prng-1ab011163d40 -

Information

Published : 2018-08-15 17:29

Updated : 2024-11-21 03:44


NVD link : CVE-2018-12056

Mitre link : CVE-2018-12056

CVE.ORG link : CVE-2018-12056


JSON object : View

Products Affected

all-for-one

  • all_for_one
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)