Skip to content
This repository was archived by the owner on Jan 13, 2022. It is now read-only.

Conversation

@Luke1410
Copy link

@Luke1410 Luke1410 commented Jun 2, 2018

This is a backport of a security relevant fix for RakNet (fixes part of issue #102) which was brought to our attention by a user - see SLikeSoft#32 for details. The issue has already been fixed in SLikeNet 0.1.2 (see https://www.slikenet.com/).
We provide this backport for people who prefer to stick with the RakNet project and also in order to easier share this fix with other RakNet forks.

CVSS Base score: 7.5
CVSS Temporal score: 7.2
CVSS Overall score: 7.2
CVSS v3 vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C

The security implications are critical in our opinion. Every RakNet instance is susceptive to the attack. No authentication is required. If the attack is successful, the instance will become unresponsive persistently (DoS attack) until the server is restarted.
If an upgrade of the server side is not reasonable to resolve the vulnerability, we offer alternative approaches to mitigate attacks relying on this issue. Please contact us at [email protected].

@Luke1410 Luke1410 changed the title Fix endless loop upon large NAK ranges (fixes part of #102 - CVSS score: 7.2) Fix endless loop upon large NAK ranges (CVSS score: 7.2) Jun 2, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant