ID CVE-2018-14715
Summary The endCoinFlip function and throwSlammer function of the smart contract implementations for Cryptogs, an Ethereum game, generate random numbers with an old block's hash. Therefore, attackers can predict the random number and always win the game.
References
Vulnerable Configurations
  • cpe:2.3:a:cryptogs:cryptogs:-:*:*:*:*:*:*:*
    cpe:2.3:a:cryptogs:cryptogs:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 02-10-2018 - 19:30)
Impact:
Exploitability:
CWE CWE-338
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-cryptogs-an-ethereum-cve-2018-14715-f63a51ac2eb9
Last major update 02-10-2018 - 19:30
Published 03-08-2018 - 18:29
Last modified 02-10-2018 - 19:30
Back to Top