FiveM Security Advisory – 2019-01-02 – FiveM Announcements

A vulnerability in the FiveM FXServer remote console code could allow an unauthenticated remote attacker to cause a C++ exception, resulting in a denial of service (DoS) condition.

This vulnerability is caused by an oversight in network packet parsing, and can be triggered by sending specially crafted UDP packets to any FiveM game server.

We have addressed this vulnerability in server releases starting at build 957 for Windows, however the corresponding Linux build is non-functional due to an unrelated bug – we’re working on a hotfix release in the feature/one-off-server-hotfix branch, and this post will be updated when it is available. You can tell what version you’re running by either:

  • Accessing https://host:port/info.json and checking the server field.
  • Running the version command in the server (remote) console.

Attackers are currently using this vulnerability in the wild, so it is practically required to upgrade your server instances to this version or higher (if available).

As a mitigation for Linux, if you do not rely on remote console commands, you can use the following iptables command to block input remote console packets:

iptables -A INPUT -m string --algo bm --hex-string "|ffffffff72636f6e|" -j DROP

CVSS score: 7.5 (High)

Original source:

User Avatar
I am an author on Gameblog24! Your favorite one, probably, huh? My games: I love the GTA-series, Minecraft and other small games like Among Us or Overwatch!

Leave a Reply

Your email address will not be published.

Subscribe to Newsletter

Give us a call or fill in the form below and we will contact you. We endeavor to answer all inquiries within 24 hours on business days.