ID CVE-2018-13497 Type cve Reporter cve@mitre.org Modified 2018-08-29T14:47:00
Description
The mintToken function of a smart contract implementation for COBToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
{"id": "CVE-2018-13497", "bulletinFamily": "NVD", "title": "CVE-2018-13497", "description": "The mintToken function of a smart contract implementation for COBToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.", "published": "2018-07-09T06:29:00", "modified": "2018-08-29T14:47:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-13497", "reporter": "cve@mitre.org", "references": ["https://github.com/BlockChainsSecurity/EtherTokens/tree/master/COBToken", "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"], "cvelist": ["CVE-2018-13497"], "type": "cve", "lastseen": "2020-10-03T13:20:12", "edition": 3, "viewCount": 3, "enchantments": {"dependencies": {"references": [], "modified": "2020-10-03T13:20:12", "rev": 2}, "score": {"value": 3.7, "vector": "NONE", "modified": "2020-10-03T13:20:12", "rev": 2}, "vulnersScore": 3.7}, "cpe": ["cpe:/a:cobtoken_project:cobtoken:-"], "affectedSoftware": [{"cpeName": "cobtoken_project:cobtoken", "name": "cobtoken project cobtoken", "operator": "eq", "version": "-"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "cpe23": ["cpe:2.3:a:cobtoken_project:cobtoken:-:*:*:*:*:*:*:*"], "cwe": ["CWE-190"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:cobtoken_project:cobtoken:-:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}