CVE-2018-12975

CVE-2018-12975

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block’s blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).

Source: CVE-2018-12975

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다