It looks intentional, having someone crashing your server.
We have the dpid with 4294967295 which is max number for a DWORD also with a packet size too big I guess, since the ptr is null. Just do a simple check of the size on CClientSock::Fetch before calculating the packet size and block it.
Code:
if((m_pRecvBuffer->GetHeaderLength() + *(UNALIGNED LPDWORD)(ptr + 1) >= DWORD_MAX) || *(UNALIGNED LPDWORD)(ptr + 1) >= DWORD_MAX)
{
//Write your own log file if you want too
WSASetLastError(ERROR_BAD_NET_NAME);
return nulltr;
}