SB2018042311 - Integer overflow in multiple Ethereum-based (ERC20) smart contracts



SB2018042311 - Integer overflow in multiple Ethereum-based (ERC20) smart contracts

Published: April 23, 2018

Security Bulletin ID SB2018042311
Severity
High
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Integer overflow (CVE-ID: CVE-2018-10299)

The vulnerability allows a remote attacker to perform unauthorized actions.

The vulnerability exists due to integer overflow in the batchTransfer() function of a smart contract implementation for Beauty Ecosystem Coin (BEC). The Ethereum ERC20 token used in the Beauty Chain economic system allows attackers to accomplish an unauthorized increase of digital assets by providing two _receivers arguments in conjunction with a large _value argument.

The vulnerability is dubbed  "batchOverflow". It is exploited in the wild and caused suspension of all transactions and transfers by OKEx exchange.

Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.