On Mon, 2006-07-10 at 13:29 -0700, Rob Schoening wrote:

> but my question is really: how vulnerable is "mtn serve" today to DoS
> and buffer overrun type exploits?

DoS: It'd be fairly simple to make monotone eat all your CPU (or on an
SMP box, as much CPU as a single-threaded program can eat). If you give
someone write access, they can also fill up your disk.

Buffer overrun: We tend to not use fixed-size buffers, so I don't think
this is terribly likely.

Tim




_______________________________________________
Monotone-devel mailing list
Monotone-devel@nongnu.org
http://lists.nongnu.org/mailman/listinfo/monotone-devel

Reply via email to