Attackathon _ Fuel Network 32548 - [Smart Contract - Low] Uncaught Integer Overflow During AbstractI
Description
Brief/Intro
Vulnerability Details
VirtualOp::MUL(dest, opd1, opd2) => {
match (reg_contents.get(opd1), reg_contents.get(opd2)) {
(Some(RegContents::Constant(c1)), Some(RegContents::Constant(c2))) => {
reg_contents.insert(dest.clone(), RegContents::Constant(c1 * c2));
record_new_def(&mut latest_version, dest);
}
_ => {
reg_contents.remove(dest);
record_new_def(&mut latest_version, dest);
}
}
}Impact Details
References
Proof of concept
Proof of Concept
PreviousAttackathon _ Fuel Network 32537 - [Smart Contract - Low] Different data types can be used when initNextAttackathon _ Fuel Network 32612 - [Smart Contract - Low] Lack of slot hashing at adminsw can cause
Last updated
Was this helpful?