CVE-2018-12975

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/09/2018
Last modified:
07/11/2023

Description

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cryptosaga:cryptosaga:-:*:*:*:*:*:*:*