This repository was archived by the owner on Jan 13, 2022. It is now read-only.
Fixed buffer overrun in PacketizedTCP::SendList() (CVSS score: n/a)#138
Open
Luke1410 wants to merge 1 commit intofacebookarchive:masterfrom
Open
Fixed buffer overrun in PacketizedTCP::SendList() (CVSS score: n/a)#138Luke1410 wants to merge 1 commit intofacebookarchive:masterfrom
Luke1410 wants to merge 1 commit intofacebookarchive:masterfrom
Conversation
…ntial leaking arbitrary data
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This is a backport of a security relevant fix for RakNet.
The issue has already been fixed in SLikeNet 0.1.3 (see https://www.slikenet.com/).
We provide this backport for people who prefer to stick with the RakNet project and also in order to easier share this fix with other RakNet forks.
A CVSS score cannot be calculated for this one, as no direct usage of PacketizedTCP::SendList() is flawed in RakNet. The issue is therefore only triggered if 3rd-party programs using RakNet make use of the method and pass in more than 512 parameters.
This is a use case which is expected to be far off from reality, so the real world security implications are likely to be non-existant.