Integer overflow in multiple Ethereum-based (ERC20) smart contracts



Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2018-10299
CWE-ID CWE-190
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
ERC-20
Client/Desktop applications / Other client software

Vendor Beauty Chain Inc.

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Integer overflow

EUVDB-ID: #VU12096

Risk: High

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2018-10299

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform unauthorized actions.

The vulnerability exists due to integer overflow in the batchTransfer() function of a smart contract implementation for Beauty Ecosystem Coin (BEC). The Ethereum ERC20 token used in the Beauty Chain economic system allows attackers to accomplish an unauthorized increase of digital assets by providing two _receivers arguments in conjunction with a large _value argument.

The vulnerability is dubbed  "batchOverflow". It is exploited in the wild and caused suspension of all transactions and transfers by OKEx exchange.

Mitigation

Cybersecurity Help is currently unaware of any official solution to resolve this vulnerability.

Vulnerable software versions

ERC-20: All versions

CPE2.3 External links

http://dasp.co/#item-3
http://peckshield.com/2018/04/22/batchOverflow/
http://support.okex.com/hc/en-us/articles/360002944212-BeautyChain-BEC-Withdrawal-and-Trading-Suspe...
http://twitter.com/OKEx_/status/987967343983714304


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###