Re: [SECURITY] DoS attack on backend possible

Поиск
Список
Период
Сортировка
От Florian Weimer
Тема Re: [SECURITY] DoS attack on backend possible
Дата
Msg-id 87r8gsxue1.fsf@CERT.Uni-Stuttgart.DE
обсуждение исходный текст
Ответ на Re: [SECURITY] DoS attack on backend possible  (ngpg@grymmjack.com)
Список pgsql-hackers
ngpg@grymmjack.com writes:

> if you are going to be passing any user input to the database, you 
> must/should validate in some manner before blindly passing it to the db.
> The db can and should guarantee data integrity, but the database cannot 
> read your mind when it comes to how you structure your queries.

[example of SQL injection attack deleted]

This is not the problem at hand.  SQL injection attacks can be avoided
easily.  Bugs in the conversion of strings to internal PostgreSQL
objects are a different matter, though, and usually, devastating
effects cannot be avoided by (reasonably complex) checks in the
frontend.

-- 
Florian Weimer                       Weimer@CERT.Uni-Stuttgart.DE
University of Stuttgart           http://CERT.Uni-Stuttgart.DE/people/fw/
RUS-CERT                          fax +49-711-685-5898


В списке pgsql-hackers по дате отправления:

Предыдущее
От: "Nigel J. Andrews"
Дата:
Сообщение: Re: Proposal: make "opaque" obsolete
Следующее
От: Tom Lane
Дата:
Сообщение: Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in