CVE-2018-12975

The random() function of the smart contract implementation for CryptoSaga, an Ethereum game, generates a random value with publicly readable variables such as timestamp, the current block's blockhash, and a private variable (which can be read with a getStorageAt call). Therefore, attackers can precompute the random number and manipulate the game (e.g., get powerful characters or get critical damages).
Configurations

Configuration 1

cpe:2.3:a:cryptosaga:cryptosaga:-:*:*:*:*:*:*:*

Information

Published : 2018-09-24 10:29

Updated : 2018-12-20 02:10


NVD link : CVE-2018-12975

Mitre link : CVE-2018-12975

Products Affected
No products.
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)