-- Vinodhkumar (vinoh) Shanmugam
On 20 March 2016 at 02:27, Nathaniel Theis <[email protected]> wrote: > From a cursory look, hooking CBaseClient::ProcessSetConVar( > NET_SetConVar *msg ) and rejecting everything but what a legitimate > client sends should fix the underlying issue (a client can fill their > m_ConVars up with as much data as they can send to the server, until > it runs out of memory and dies) > > On Sat, Mar 19, 2016 at 1:48 PM, ics <[email protected]> wrote: > > Sounds like an old exploit that has resurfaced. > > > > -ics > > > > balon kirjoitti: > >> > >> Our community can also confirm that we are being flooded as well. > >> > >> Reference post: https://forums.alliedmods.net/showthread.php?t=280545 > >> > >> NeutroToxin said: > >> "So apparently... > >> > >> The exploit runs @ 1ms. > >> > >> And calls client side: setinfo x x > >> > >> Where x is in a for loop > >> > >> Sounds like the command executing client side is: > >> > >> setinfo 1 1 > >> setinfo 2 2 > >> setinfo 3 3 ... ect" > >> > > > > > > _______________________________________________ > > Csgo_servers mailing list > > [email protected] > > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers > > _______________________________________________ > Csgo_servers mailing list > [email protected] > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers >
_______________________________________________ Csgo_servers mailing list [email protected] https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
