Full Disclosure mailing list archives
DoS attacks using SQL Wildcards
From: "Ferruh Mavituna" <ferruh () mavituna com>
Date: Mon, 19 May 2008 15:15:33 +0100
Paper can be downloaded from http://www.portcullis-security.com/uplds/wildcard_attacks.pdf This paper discusses abusing Microsoft SQL Query wildcards to consume CPU in database servers using only the search field present in most common web applications. Majority of the Microsoft SQL Server based web applications are vulnerable to this attack. Other databases could be vulnerable depending on how the applications implement search functionalities although common implementation of the search functionality in SQL Server back-end applications is vulnerable. There are real world scenarios and detailed analysis in the paper which explains and shows the impact of this attack. Regards, -- Ferruh Mavituna _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- DoS attacks using SQL Wildcards Ferruh Mavituna (May 19)
- <Possible follow-ups>
- DoS attacks using SQL Wildcards Ferruh Mavituna (May 19)