Hi Rowan,

On Thu, Apr 30, 2015 at 11:17 AM, Yasuo Ohgaki <yohg...@ohgaki.net> wrote:

>
>>  A fatal error wouldn't constitute a DoS vulnerability, would it?
>>>>
>>>>  Attacker may inject huge ID value and/or they may simply access
>>> web sites to reach 2 billion limit, for example.
>>>
>>
>> That's not a DoS vector unless you've also done something else wrong,
>> it's just an embarassing error like many others. A lot of the time, the DB
>> will overflow first anyway, because an SQL "int" is signed 32-bit. Hell,
>> YouTube had a 32-bit int for number of views until Gangnam Style overflowed
>> it!
>>
>
> Not really. Primary key is out of user control almost always. However,
> suppose code allows to specify foreign key and code assumes that non
> existing foreign key results in search query failure.
>
> Current PHP: Search query failure.
> New PHP type hint: Fatal error because foreign key is out of PHP int range.
>
> If user are using type hints everywhere, it may be limited to attackers
> seeing fatal errors. If not, attacker can succeed system wide DoS attack by
> simple operation.
>

I should have mentioned that I'm supposing DBMS like SQLite here.
As we know, SQLite column accepts any value including value beyond 64 bit
int.

https://www.sqlite.org/datatype3.html
(Those who don't now "Type Affinity", please read the section)

SQLite is the most used RDBMS in the world.

MySQL supports unsigned 64 bit integer also, BTW.

Regards,

--
Yasuo Ohgaki
yohg...@ohgaki.net

Reply via email to