About Question enthuware.ocpjp.v11.2.3420 :
Moderator: admin
-
- Posts: 6
- Joined: Tue Jan 26, 2021 9:24 am
- Contact:
Re: About Question enthuware.ocpjp.v11.2.3420 :
Could someone explain, why the code violates "Resource limit checks should not suffer from integer overflow"? I don't see any resource limit checks in the code. I undestand that the code might crash if the length becomes smaller due to overflow, but I don't see the security problem here.
-
- Site Admin
- Posts: 10388
- Joined: Fri Sep 10, 2010 9:26 pm
- Contact:
Re: About Question enthuware.ocpjp.v11.2.3420 :
It may not exactly be a security problem but it does violate the Guideline 1-3 / DOS-3: "Resource limit checks should not suffer from integer overflow".
A method that allocates large chunks of memory is prone to denial of service attacks as well.
A method that allocates large chunks of memory is prone to denial of service attacks as well.
Who is online
Users browsing this forum: No registered users and 6 guests