The _addguess function of a simplelottery smart contract implementation for 1000 Guess, an Ethereum gambling game, generates a random value with publicly readable variables such as the current block information and a private variable (which can be read with a getStorageAt call). Therefore, it allows attackers to always win and get rewards.
References
Link | Resource |
---|---|
https://medium.com/@jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-06-17 05:29
Updated : 2018-08-14 10:44
NVD link : CVE-2018-12454
Mitre link : CVE-2018-12454
JSON object : View
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Products Affected
1000guess
- 1000_guess