Hi,

I noticed that using the dict regular expression search feature, it is
possible to get extremely large amounts of data from a server with dictd
running, for example `dictd -s regexp [a-z]` would return the entire
dictionary (assuming that all headwords contained a lower case letter).

My concern is that for larger dictionaries, an attacker could repeatedly
make requests for significant portions of the dictionary, thus leading
to denial of service. This could potentially be mitigated by imposing a
limit on the amount of data that can be sent per request.

Yours sincerely,

Riley Baird


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54bc89cb.4020...@bitmessage.ch

Reply via email to