oxen-core/src/cryptonote_protocol
anonimal 8f66b7053a
cryptonote_protocol_handler: prevent potential DoS
Essentially, one can send such a large amount of IDs that core exhausts
all free memory. This issue can theoretically be exploited using very
large CN blockchains, such as Monero.

This is a partial fix. Thanks and credit given to CryptoNote author
'cryptozoidberg' for collaboration and the fix. Also thanks to
'moneromooo'. Referencing HackerOne report #506595.
2019-06-14 08:47:05 +00:00
..
block_queue.cpp Update 2019 copyright 2019-03-05 22:05:34 +01:00
block_queue.h Update 2019 copyright 2019-03-05 22:05:34 +01:00
CMakeLists.txt Update 2019 copyright 2019-03-05 22:05:34 +01:00
cryptonote_protocol_defs.h Make difficulty 128 bit instead of 64 bit 2019-03-24 21:03:19 +00:00
cryptonote_protocol_handler-base.cpp Update 2019 copyright 2019-03-05 22:05:34 +01:00
cryptonote_protocol_handler.h cryptonote_protocol_handler: prevent potential DoS 2019-06-14 08:47:05 +00:00
cryptonote_protocol_handler.inl cryptonote_protocol_handler: prevent potential DoS 2019-06-14 08:47:05 +00:00
cryptonote_protocol_handler_common.h Update 2019 copyright 2019-03-05 22:05:34 +01:00