You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A denial of service vulnerability in vavr was discovered by CIFuzz. A bug in method CharSeq.repeat(char, int) means that an input of modest size can lead to indefinite amounts of memory being used. Can recurrent it like follows code.
I can imagine how this can be recognized as Dos Vulnerability: if you are certain that some application is using it, you could force some extra memory consumption leading to its collapse.
But there's not much we can do about it: if you want to create a String instance legally, it involves some array copying. That's how String and StringBuilder works. There are easier and more efficient ways to induce OOMEs.
Also, this method is often used in demos and tests and not in production code, which makes it effectively harmless
Summary
A denial of service vulnerability in vavr was discovered by CIFuzz. A bug in method CharSeq.repeat(char, int) means that an input of modest size can lead to indefinite amounts of memory being used. Can recurrent it like follows code.
POC
pom
code
Attack
The text was updated successfully, but these errors were encountered: