A gambling smart contract implementation for RuletkaIo, an Ethereum gambling game, generates a random value that is predictable by an external contract call. The developer wrote a random() function that uses a block timestamp and block hash from the Ethereum blockchain. This can be predicted by writing the same random function code in an exploit contract to determine the deadSeat value.
References
| Link | Resource |
|---|---|
| https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17968 | Exploit Third Party Advisory |
| https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17968 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TEAM-C4B/CVE-LIST/tree/master/CVE-2018-17968 - Exploit, Third Party Advisory |
Information
Published : 2018-10-23 21:30
Updated : 2024-11-21 03:55
NVD link : CVE-2018-17968
Mitre link : CVE-2018-17968
CVE.ORG link : CVE-2018-17968
JSON object : View
Products Affected
ruletkaio
- ruletkaio
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
