Re: [SECURITY] DoS attack on backend possible

From: Florian Weimer <Weimer(at)CERT(dot)Uni-Stuttgart(dot)DE>
To: pgsql-hackers(at)postgresql(dot)org
Subject: Re: [SECURITY] DoS attack on backend possible
Date: 2002-08-21 12:34:46
Message-ID: 87r8gsxue1.fsf@CERT.Uni-Stuttgart.DE
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-committers pgsql-hackers

ngpg(at)grymmjack(dot)com writes:

> if you are going to be passing any user input to the database, you
> must/should validate in some manner before blindly passing it to the db.
> The db can and should guarantee data integrity, but the database cannot
> read your mind when it comes to how you structure your queries.

[example of SQL injection attack deleted]

This is not the problem at hand. SQL injection attacks can be avoided
easily. Bugs in the conversion of strings to internal PostgreSQL
objects are a different matter, though, and usually, devastating
effects cannot be avoided by (reasonably complex) checks in the
frontend.

--
Florian Weimer Weimer(at)CERT(dot)Uni-Stuttgart(dot)DE
University of Stuttgart http://CERT.Uni-Stuttgart.DE/people/fw/
RUS-CERT fax +49-711-685-5898

In response to

Responses

Browse pgsql-committers by date

  From Date Subject
Next Message Bruce Momjian - CVS 2002-08-21 16:08:19 pgsql-server/doc/src/sgml func.sgml
Previous Message Bruce Momjian - CVS 2002-08-21 05:25:50 pgsql-server/doc/src/sgml func.sgml

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2002-08-21 13:46:16 Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in
Previous Message Nigel J. Andrews 2002-08-21 09:22:24 Re: Proposal: make "opaque" obsolete