Quote:

Researchers have shown how a flaw that is common to most popular Web 
programming languages can be used to launch denial-of-service attacks by
 exploiting hash tables. Announced publicly on Wednesday at the Chaos 
Communication Congress
 event in Germany, the flaw affects a long list of technologies, 
including PHP, ASP.NET, Java, Python, Ruby, Apache Tomcat, Apache 
Geronimo, Jetty, and Glassfish, as well as Google's open source 
JavaScript engine V8. The vendors and developers behind these 
technologies are working to close the vulnerability, with Microsoft 
warning of "imminent public release of exploit code" for what is known as a 
hash collision attack.

...

"Hash tables are a commonly used data structure in most programming 
languages," they explained. "Web application servers or platforms 
commonly parse attacker-controlled POST form data into hash tables 
automatically, so that they can be accessed by application developers. 
If the language does not provide a randomized hash function or the 
application server does not recognize attacks using multi-collisions, an
 attacker can degenerate the hash table by sending lots of colliding 
keys. The algorithmic complexity of inserting n elements into the table 
then goes to O(n**2), making it possible to exhaust hours of CPU time 
using a single HTTP request."

more-> 
http://arstechnica.com/business/news/2011/12/huge-portions-of-web-vulnerable-to-hashing-denial-of-service-attack.ars

Seems to be a big deal with a lot of servers. Is MarkLogic affected?

thanks,
Ryan
                                          
_______________________________________________
General mailing list
General@developer.marklogic.com
http://developer.marklogic.com/mailman/listinfo/general

Reply via email to