You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@thrift.apache.org by "Jake Farrell (JIRA)" <ji...@apache.org> on 2012/10/12 02:49:03 UTC

[jira] [Closed] (THRIFT-1643) Denial of Service attack in TBinaryProtocol.readString

     [ https://issues.apache.org/jira/browse/THRIFT-1643?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Jake Farrell closed THRIFT-1643.
--------------------------------

       Resolution: Fixed
    Fix Version/s: 0.9
         Assignee: Niraj Tolia  (was: Jake Farrell)

Committed to trunk and 0.9 branch pre-rc
                
> Denial of Service attack in TBinaryProtocol.readString
> ------------------------------------------------------
>
>                 Key: THRIFT-1643
>                 URL: https://issues.apache.org/jira/browse/THRIFT-1643
>             Project: Thrift
>          Issue Type: Bug
>          Components: Java - Library
>    Affects Versions: 0.6.1, 0.8
>         Environment: All
>            Reporter: Devesh Parekh
>            Assignee: Niraj Tolia
>            Priority: Critical
>              Labels: security
>             Fix For: 0.9
>
>         Attachments: 0001-Address-denial-of-service-in-TCompactProtocol.patch, 0001-Add-test-for-TCompactProtocol-OOM-Denial-of-Service.patch, 0002-Add-test-for-TBinaryProtocol-OOM-Denial-of-Service.patch, 0003-Cleanup-length-checks-in-TCompactProtocol.patch, Attack.java, Foo.thrift
>
>   Original Estimate: 24h
>  Remaining Estimate: 24h
>
> In readString, if the string field's size is greater than the number of bytes remaining in the byte array to deserialize, libthrift will happily allocate a byte array of that size in readStringBody, filling the heap.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira