First published: Wed Nov 15 2023(Updated: )
### Impact A client can send reliable-ordered packets 0, 2, 3, 4, 5 ... etc, and all the packets 2 and up will stay in the reliable-ordered queue until 1 arrives. A malicious client can exploit this to waste all available server memory by simply never sending the missing packet. Since the server doesn't make any effort to limit the size of the queue or detect this kind of abuse, this problem is easy to abuse. ### Patches This bug was fixed on the 0.14.x and 0.15.x release lines by 371190f5854372154d1b263cd2a10e658e92bebe. ### Workarounds No workaround is known.
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pocketmine/raklib | >=0.15.0<0.15.1 | 0.15.1 |
composer/pocketmine/raklib | >=0.14.0<0.14.6 | 0.14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
A client can send reliable-ordered packets and exploit the server's memory, causing a waste of available resources.
By never sending the missing packet in a sequence, the client can cause the server to hold all subsequent packets in memory, leading to resource exhaustion.
Versions 0.15.0 up to and including 0.15.1, as well as versions 0.14.0 up to and including 0.14.6.
The severity of vulnerability GHSA-w98g-5fmx-wm4x is medium, with a severity value of 5.3.
To fix vulnerability GHSA-w98g-5fmx-wm4x, update pocketmine/raklib to version 0.15.1 or 0.14.6, depending on the affected version.