[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] Integer overflow in Tracto ERC20
From:       姚 <zhihua.yao () dbappsecurity ! com ! cn>
Date:       2018-07-24 1:58:11
Message-ID: 6e1ee87a.38c.164ca0215e3.Coremail.zhihua.yao () dbappsecurity ! com ! cn
[Download RAW message or body]

Hello,I found an integer overflow in increaseApproval function.And it doesn't use the safe function to add value.
code addresss:
https://etherscan.io/address/0x30ceCB5461A449A90081F5a5F55db4e048397BAB
vuln code:

    function increaseApproval (address _spender, uint _addedValue) 
        returns (bool success) {
        //allowed[msg.sender][_spender] = allowed[msg.sender][_spender].add(_addedValue);
        allowed[msg.sender][_spender] += _addedValue;   //integer overflow
        Approval(msg.sender, _spender, allowed[msg.sender][_spender]);
        return true;
      }
This issue has been already applied for CVE-2018-14063


The issue link :
https://github.com/tracto2/Tracto-ERC20/issues/1

--

-----------------------------------------------------------------


杭州安恒信息技术股份有限公司
明鉴事业部-策略引擎部
手机:13588722924
邮箱:zhihua.yao@dbappsecurity.com.cn
公司网址:http://www.dbappsecurity.com.cn
官方微信:DBAPP2013   客服热线:400-6059-110
联系地址:杭州市滨江区通和路68号中财大厦15层(310051)
-----------------------------------------------------------------

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic