Why Nostr? What is Njump?
2023-06-07 17:45:28

Simon Liu [ARCHIVE] on Nostr: đź“… Original date posted:2015-12-02 đź“ť Original message:Hi Pavel, (my earlier ...

đź“… Original date posted:2015-12-02
đź“ť Original message:Hi Pavel,

(my earlier email was moderated, so the list can only see it via your
reply),

Yes, an attacker could try and send malicious data to take advantage of
a compression library vulnerability... but is it that much worse than
existing attack vectors which might also result in denial of service,
crashes, remote execution?

Peter, perhaps your BIP can look at possible ways to isolate the
decompression phase, such as having incoming compressed blocks be saved
to a quarantine folder and an external process/daemon decompress and
verify the block's hash?

Regards,
Simon


On 12/01/2015 10:47 PM, Pavel JanĂ­k wrote:
>
>> On 02 Dec 2015, at 00:44, Simon Liu <simon at bitcartel.com> wrote:
>>
>> Hi Matt/Pavel,
>>
>> Why is it scary/undesirable? Thanks.
>
> Select your preferable compression library and google for it with +CVE.
>
> E.g. in zlib:
>
> http://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-1820/GNU-Zlib.html
>
> …allows remote attackers to cause a denial of service (crash) via a crafted compressed stream…
> …allows remote attackers to cause a denial of service (application crash)…
> etc.
>
> Do you want to expose such lib to the potential attacker?
> --
> Pavel JanĂ­k
>
>
>
>
Author Public Key
npub1a3zpmn53lhv8jv7vjg3daletu2e6e9ce88737ga2r7dkr7yc7dss7r6s85