[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAJVRA1S8MnkFXGgZ3==h0kpzxZdjiw8tbbbL8JQ_Zg4zT0sSGw@mail.gmail.com>
Date: Thu, 29 Dec 2011 23:37:05 -0800
From: coderman <coderman@...il.com>
To: adam <adam@...sy.net>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: n.runs-SA-2011.004 - web programming
languages and platforms - DoS through hash table
On Thu, Dec 29, 2011 at 11:24 AM, adam <adam@...sy.net> wrote:
> In any case, the concept is pretty interesting.
data structures exposed to potentially malicious user input. what
could go wrong?
Big-O: a perfect case is not typical.
real-world is sometimes not average.
attacker inputs, they're always aiming for the worst!
> It's not a vector that most
> people would think of when securing their applications/servers. At least,
> most people I've come in contact with, anyway.
welcome to the state of 21st century infosec. :)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists