Re: [SECURITY] DoS attack on backend possible

Поиск
Список
Период
Сортировка
От ngpg@grymmjack.com
Тема Re: [SECURITY] DoS attack on backend possible
Дата
Msg-id Xns9271B17F97FA9wn7t0983uom3iu23n@64.49.215.80
обсуждение исходный текст
Ответ на Re: [SECURITY] DoS attack on backend possible  (Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>)
Список pgsql-hackers
Weimer@CERT.Uni-Stuttgart.DE (Florian Weimer) wrote 

> ngpg@grymmjack.com writes:
> 
>> if you are going to be passing any user input to the database, you 
>> must/should validate in some manner before blindly passing it to the db.
>> The db can and should guarantee data integrity, but the database cannot 
>> read your mind when it comes to how you structure your queries.
> 
> [example of SQL injection attack deleted]
> 
> This is not the problem at hand.  SQL injection attacks can be avoided
> easily.  Bugs in the conversion of strings to internal PostgreSQL
> objects are a different matter, though, and usually, devastating
> effects cannot be avoided by (reasonably complex) checks in the
> frontend.
> 

yeah i wasnt aware that adding a if(strlen($input) > SOME_REASONABLE_MAX) 
was complex.  the sql injection attack was just an(other) example of why 
you do not simply forward user input to the backend.  all i was trying to 
point out is that most of these buffer overflows in the backend can be 
avoided just as easily as the sql injection attack.


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Bruce Momjian
Дата:
Сообщение: Re: Large file support available
Следующее
От: Bruce Momjian
Дата:
Сообщение: Re: Build failure in current CVS