ID CVE-2018-13625 Type cve Reporter cve@mitre.org Modified 2018-08-30T13:00:00
Description
The mintlvlToken function of a smart contract implementation for Krown, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
{"id": "CVE-2018-13625", "bulletinFamily": "NVD", "title": "CVE-2018-13625", "description": "The mintlvlToken function of a smart contract implementation for Krown, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.", "published": "2018-07-09T06:29:00", "modified": "2018-08-30T13:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-13625", "reporter": "cve@mitre.org", "references": ["https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md", "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Krown"], "cvelist": ["CVE-2018-13625"], "type": "cve", "lastseen": "2021-02-02T06:52:28", "edition": 4, "viewCount": 3, "enchantments": {"dependencies": {"references": [], "modified": "2021-02-02T06:52:28", "rev": 2}, "score": {"value": 3.8, "vector": "NONE", "modified": "2021-02-02T06:52:28", "rev": 2}, "vulnersScore": 3.8}, "cpe": ["cpe:/a:plutocracy:krown:-"], "affectedSoftware": [{"cpeName": "plutocracy:krown", "name": "plutocracy krown", "operator": "eq", "version": "-"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "cpe23": ["cpe:2.3:a:plutocracy:krown:-:*:*:*:*:*:*:*"], "cwe": ["CWE-190"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:plutocracy:krown:-:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}, "extraReferences": [{"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md", "refsource": "MISC", "tags": ["Third Party Advisory", "Exploit"], "url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"}, {"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Krown", "refsource": "MISC", "tags": ["Third Party Advisory"], "url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Krown"}]}