An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Link | Tags |
---|---|
https://etherscan.io/address/0x4daa9dc438a77bd59e8a43c6d46cbfe84cd04255#code | third party advisory |
https://github.com/GreenFoxy/Smart-contract-Vulnerabilities/blob/master/BattleToken.md | third party advisory exploit |