|
[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message] Re: Malicious XML
> ** Reply to message from "Karl Waclawek" <karl@w...> on Thu, 14 Nov > 2002 16:15:41 -0500 > > > are there any well-known ways to protect against > > malicious XML, e.g. XML that causes your parser > > to eat up all memory? > > Disconnect your machine from any networks before you start parsing. Well - we - the Expat team have just been notified of a "security vulnerability" in Expat by a company called Sanctum, http://www.sanctuminc.com/ . No idea who they are, and I don't agree with their assessment, i.e. it is not Expat's job to check memory use. That is the memory manager's job. Anyway, their example uses a really trivial internal subset to bring down a SOAP server. I wonder if there are more well known XML examples that can cause a parser to eat up all memory. Properly used, Expat is already equipped to handle such situations since it allows for a pluggable memory handler. Karl
|
PURCHASE STYLUS STUDIO ONLINE TODAY!Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced! Download The World's Best XML IDE!Accelerate XML development with our award-winning XML IDE - Download a free trial today! Subscribe in XML format
|
|||||||||

Cart








