{"uuid": "cdaa5a7a-6441-4e6e-8308-88e10365f85f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-PPXX-5M9H-6VXF", "type": "seen", "source": "https://t.me/arpsyndicate/2947", "content": "#ExploitObserverAlert\n\nGHSA-ppxx-5m9h-6vxf\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-PPXX-5M9H-6VXF. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate.\n\nGHSS: 6.4", "creation_timestamp": "2024-01-19T18:05:27.000000Z"}