The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-4838 The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:45:02.506Z

Reserved: 2018-06-26T00:00:00

Link: CVE-2018-12885

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-07T15:29:00.733

Modified: 2024-11-21T03:46:02.383

Link: CVE-2018-12885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses