lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJVRA1S8MnkFXGgZ3==h0kpzxZdjiw8tbbbL8JQ_Zg4zT0sSGw@mail.gmail.com> Date: Thu, 29 Dec 2011 23:37:05 -0800 From: coderman <coderman@...il.com> To: adam <adam@...sy.net> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table On Thu, Dec 29, 2011 at 11:24 AM, adam <adam@...sy.net> wrote: > In any case, the concept is pretty interesting. data structures exposed to potentially malicious user input. what could go wrong? Big-O: a perfect case is not typical. real-world is sometimes not average. attacker inputs, they're always aiming for the worst! > It's not a vector that most > people would think of when securing their applications/servers. At least, > most people I've come in contact with, anyway. welcome to the state of 21st century infosec. :) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists