Description
The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
Published: 2018-08-07
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-4838 The randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.
History

No history.

Subscriptions

Mycryptochamp Mycryptochamp
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:45:02.506Z

Reserved: 2018-06-26T00:00:00.000Z

Link: CVE-2018-12885

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-07T15:29:00.733

Modified: 2024-11-21T03:46:02.383

Link: CVE-2018-12885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses