Re: [SECURITY] DoS attack on backend possible (was: Re:

From: Florian Weimer <Weimer(at)CERT(dot)Uni-Stuttgart(dot)DE>
To: Justin Clift <justin(at)postgresql(dot)org>
Cc: pgsql-hackers(at)postgresql(dot)org
Subject: Re: [SECURITY] DoS attack on backend possible (was: Re:
Date: 2002-08-11 17:17:20
Message-ID: 8765yh5n8f.fsf@CERT.Uni-Stuttgart.DE
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-committers pgsql-hackers

Justin Clift <justin(at)postgresql(dot)org> writes:

> - A PostgreSQL 7.2.1 server can be crashed if it gets passed certain
> date values which would be accepted by standard "front end" parsing?
> So, a web application layer can request a date from a user, do standard
> integrity checks (like looking for weird characters and formatting
> hacks) on the date given, then use the date as part of a SQL query, and
> PostgreSQL will die?

It depends on the checking. If you just check that the date consists
of digits (and a few additional characters), it's possible to crash
the server.

--
Florian Weimer Weimer(at)CERT(dot)Uni-Stuttgart(dot)DE
University of Stuttgart http://CERT.Uni-Stuttgart.DE/people/fw/
RUS-CERT fax +49-711-685-5898

In response to

Responses

Browse pgsql-committers by date

  From Date Subject
Next Message Peter Eisentraut - PostgreSQL 2002-08-11 17:44:12 pgsql-server/ oc/src/sgml/ref/create_cast.sgml ...
Previous Message Tom Lane 2002-08-11 17:09:41 Re: [SECURITY] DoS attack on backend possible (was: Re:

Browse pgsql-hackers by date

  From Date Subject
Next Message Peter Eisentraut 2002-08-11 17:58:56 libpqxx
Previous Message Joe Conway 2002-08-11 17:15:43 Re: [GENERAL] workaround for lack of REPLACE() function