one of the best. Fourni par Blogger.

Test Footer

Home » » Resource exhaustion

Resource exhaustion

Written By Tao on dimanche 18 août 2013 | 12:02

Description



Resource exhaustion is a simple denial of service condition which occurs when the resources necessary to perform an action are entirely consumed, therefore preventing that action from taking place.



Consequences


  • Availability: The most common result of resource exhaustion is denial-of-service.

  • Access control: In some cases it may be possible to force a system to "fail open" in the event of resource exhaustion.




Exposure period


  • Design: Issues in system architecture and protocol design may make systems more subject to resource-exhaustion attacks.

  • Implementation: Lack of low level consideration often contributes to the problem.




Platform


  • Languages: All

  • Platforms: All




Required resources

any



Severity

Low to medium



Likelihood of exploit

Very high



Resource exhaustion issues are generally understood but are far more difficult to successfully prevent. Resources can be exploited simply by ensuring that the target machine must do much more work and consume more resources in order to service a request than the attacker must do to initiate a request.



Prevention of these attacks requires either that the target system:


  • either recognizes the attack and denies that user further access for a given amount of time;

  • or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed.




The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, he may be able to prevent the user from accessing the server in question.



The second solution is simply difficult to effectively institute - and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.



The final concern that must be discussed about issues of resource exhaustion is that of systems which "fail open." This means that in the event of resource consumption, the system fails in such a way that the state of the system - and possibly the security functionality of the system - is compromised.



A prime example of this can be found in old switches that were vulnerable to "macof" attacks (so named for a tool developed by Dugsong). These attacks flooded a switch with random IP and MAC address combinations, therefore exhausting the switch's cache, which held the information of which port corresponded to which MAC addresses. Once this cache was exhausted, the switch would fail in an insecure way and would begin to act simply as a hub, broadcasting all traffic on all ports and allowing for basic sniffing attacks.



Risk Factors

TBD



Examples



In Java:

class Worker

implements Executor { ...

public void execute(Runnable r)

{ try

{ ...

} catch (InterruptedException ie)

{ // postpone response Thread.currentThread().interrupt();

}

} public Worker(Channel ch, int nworkers)

{ ...

} protected void activate()

{ Runnable loop = new Runnable()

{ public void run()

{ try

{ for (;;)

{ Runnable r = ... r.run();

}

} catch (InterruptedException ie) {...}

}

}; new Thread(loop).start();

} In C/C++: int main(int argc, char *argv[])

{ sock=socket(AF_INET, SOCK_STREAM, 0);

while (1) { newsock=accept(sock, ...);

printf("A connection has been accepted\n");

pid = fork(); }



There are no limits to runnables/forks. Potentially an attacker could cause resource problems very quickly.



via oneofthebest All articles about hacking have only an educational goal and we are not responsible

0 commentaires:

Enregistrer un commentaire

Popular Posts

Random post