The attacker called the function recursively inside the original split, thus repeatedly collecting ether within a single transaction.
Not exact matches
The
attacker identifies a standard
function in the victim code — in the kernel or otherwise — that does what's
called a «bounds check», before passing back data from a table.
The vulnerability, a socket left open and accessible on the Nvidia Icera modem used in the Blackphone, lets
attackers take control of many of the modem's
functions, including sending and receiving text messages, dialing or connecting
calls, and changing the phone's settings.
The attack is a recursive
calling vulnerability, where an
attacker called the «split»
function, and then
calls the split
function recursively inside of the split, thereby collecting ether many times over in a single transaction.