Trinitycore: [Exploit] client sent malformed packet, Freeze World ServeR

Created on 4 Nov 2018  路  5Comments  路  Source: TrinityCore/TrinityCore

Description: New Exploit Hack Server by Player Hacker for Trinitycore.
sent malformed packet spam on server by exploit hack that causes server will to freeze and use CPU 101.7 %

server ready on mode debug but Does not get Crash log , backtrace.log! Just Freeze.
i checked last log server packet send by Player To Server and just saw


WorldSocket::ReadHeaderHandler(): client 178.79.153.235 sent malformed packet (size: 11113, cmd: 3718660925)

image:
https://imgur.com/a/4kA9wpC

server firewall? ovh! : yes
linux cfg limit packets? yes

Branch: 3.3.5
TC Rev: https://github.com/TrinityCore/TrinityCore/commit/bbdf62d6e84a47036e39a59a1349c073711ec2ca
OS: Ubuntu

Branch-3.3.5a Comp-Core

Most helpful comment

You should enable freeze detector in worldserver.conf in order to crash in case of freeze, it will allow TC dev to have a crashlog to work with

All 5 comments

You should enable freeze detector in worldserver.conf in order to crash in case of freeze, it will allow TC dev to have a crashlog to work with

how much bytes/s and packets/s was client 178.79.153.235 sending ?

also, if low pop server enable packet login.

@HAANAAE post crashlog enabling freeze detector like @Traesh sugested.

no answer after more than 1 year, closing.

Was this page helpful?
0 / 5 - 0 ratings