About Question enthuware.ocpjp.v11.2.3420 :
Moderator: admin
- 
				peterz
 - Posts: 6
 - Joined: Tue Jan 26, 2021 9:24 am
 - Contact:
 
Re: About Question enthuware.ocpjp.v11.2.3420 :
Could someone explain, why the code violates "Resource limit checks should not suffer from integer overflow"? I don't see any resource limit checks in the code. I undestand that the code might crash if the length becomes smaller due to overflow, but I don't see the security problem here.
			
			
									
									
						
		Online		
						
						
		
				
		
		
	- 
				admin
 - Site Admin
 - Posts: 10443
 - Joined: Fri Sep 10, 2010 9:26 pm
 - Contact:
 
Re: About Question enthuware.ocpjp.v11.2.3420 :
It may not exactly be a security problem but it does violate the Guideline 1-3 / DOS-3: "Resource limit checks should not suffer from integer overflow".
A method that allocates large chunks of memory is prone to denial of service attacks as well.
			
			
									
									
						A method that allocates large chunks of memory is prone to denial of service attacks as well.
Who is online
Users browsing this forum: No registered users and 24 guests