[issue13891] CPU DoS With Python's socket module

2012-01-27 Thread John Zimmerman
John Zimmerman added the comment: Hi Antoine, The issue is that the CPU spikes to ~90% utilization for the server during the attack, for as long as the attack lasts. So the theory is that Python isn't throttling or processing the malformed packets properly. Copying Renier for

[issue13891] CPU DoS With Python's socket module

2012-01-27 Thread John Zimmerman
John Zimmerman added the comment: Thanks for your quick response, I downloaded the ISIC tool and used the following command to identify the problem: udpsic -s rand -d server-ip-address,port where port is 514 (syslogd) which uses a python script to process the incoming messages. The command

[issue13891] CPU DoS With Python's socket module

2012-01-27 Thread John Zimmerman
New submission from John Zimmerman : Python's socket module as included in Ubuntu Lucid (python version 2.6.5) does not correctly handle and exclude malformed UDP packets. This means that UDP listening programs written in python on this version are susceptible to malformed-UDP-packet