Integer overflow in ERC-20 - CVE-2018-10299

 

Integer overflow in ERC-20 - CVE-2018-10299

Published: April 23, 2018 / Updated: April 23, 2018


Vulnerability identifier: #VU12096
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2018-10299
CWE-ID: CWE-190
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vendor: Beauty Chain Inc.
Affected software:
ERC-20

Detailed vulnerability description

The vulnerability allows a remote attacker to perform unauthorized actions.

The vulnerability exists due to integer overflow in the batchTransfer() function of a smart contract implementation for Beauty Ecosystem Coin (BEC). The Ethereum ERC20 token used in the Beauty Chain economic system allows attackers to accomplish an unauthorized increase of digital assets by providing two _receivers arguments in conjunction with a large _value argument.

The vulnerability is dubbed  "batchOverflow". It is exploited in the wild and caused suspension of all transactions and transfers by OKEx exchange.

How to mitigate CVE-2018-10299

Cybersecurity Help is currently unaware of any official solution to resolve this vulnerability.

Sources