Tracto ERC20 suffers from an integer overflow vulnerability.
bc34d4bbbffaebf35132a4b460490459086c1cddcfe292345c067eb4956963b2
Hello,I found an integer overflow in increaseApproval function.And it doesn't use the safe function to add value.
code addresss:
https://etherscan.io/address/0x30ceCB5461A449A90081F5a5F55db4e048397BAB
vuln code:
function increaseApproval (address _spender, uint _addedValue)
returns (bool success) {
//allowed[msg.sender][_spender] = allowed[msg.sender][_spender].add(_addedValue);
allowed[msg.sender][_spender] += _addedValue; //integer overflow
Approval(msg.sender, _spender, allowed[msg.sender][_spender]);
return true;
}
This issue has been already applied for CVE-2018-14063
The issue link :
https://github.com/tracto2/Tracto-ERC20/issues/1
--
-----------------------------------------------------------------
aea*a(r)aea?!ae-aeae-e!a>>1/2aeea!a,
aee'aoa,e"-ccY=a1/4aee"
aeaeo:13588722924
e(r)c(r)+-:zhihua.yao@dbappsecurity.com.cn
a!a,c1/2a:https://www.dbappsecurity.com.cn
a(r)ae1a3/4(r)a?!:DBAPP2013 a(r)C/aecco?:400-6059-110
ec3>>adega:aea*a,ae>>"ae+-aoeae*-68a*a,e'C/a$?SSa|15a+-i1/4310051i1/4
-----------------------------------------------------------------