04-19-2015, 01:59 AM 
		
	
	
	
	
	
	
| 
				
				 
					Security issue in Java based server
				 
			 | 
		
| 
	 
		
		
		04-19-2015, 02:33 AM 
		
	 
	
		Recursion depth alone won't prevent this attack - it has a maximum depth of 6, which is a perfectly reasonable NBT depth. And again, what maximum size to choose for the uncompressed packets?
	 
	
	
	
	
		
		
		04-19-2015, 03:04 AM 
		
	 
	
		Well since we limit packet size to 32 KiB I suggest 512 KiB as a limit. Most non-pathological structured data has a less than 10:1 compression ratio so having a limit of 16 times compressed size seems reasonable. Limiting this in the NBT parser could be as simple as limiting the size of cFastNBT::m_Tags to a sensible value. Can I suggest 1,000? 
	
	
	
	
Recursion depth for NBT was more of a general issue as if you can jump the guard page it allows the attacker to write arbitrary data to memory.  | 
| 
				
	 
					« Next Oldest | Next Newest »
				 
			 | 
		
Users browsing this thread: 1 Guest(s)

