2024-12-08 03:06:42 +00:00

144 lines
4.1 KiB
JSON

{
"id": "CVE-2018-10376",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-04-25T09:29:00.707",
"lastModified": "2024-11-21T03:41:17.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets via crafted _fee and _value parameters, as exploited in the wild in April 2018, aka the \"proxyOverflow\" issue."
},
{
"lang": "es",
"value": "Un desbordamiento de enteros en la funci\u00f3n transferProxy de una implementaci\u00f3n de contrato inteligente SmartMesh (SMT), un token de Ethereum ERC20, permite que atacantes logren un aumento no autorizado de los activos digitales mediante los par\u00e1metros manipulados _fee y _value, tal y como se explot\u00f3 \"in the wild\" en abril de 2018. Este problema tambi\u00e9n se conoce como \"proxyOverflow\"."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smartmesh:smartmesh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF19213-D3B8-443E-AFDE-6E5339F899C0"
}
]
}
]
}
],
"references": [
{
"url": "https://dasp.co/#item-3",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://peckshield.com/2018/04/25/proxyOverflow/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://dasp.co/#item-3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://peckshield.com/2018/04/25/proxyOverflow/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}