[issue13891] CPU DoS With Python's socket module

John Zimmerman report at bugs.python.org
Fri Jan 27 18:59:27 CET 2012


John Zimmerman <johzimme at cisco.com> added the comment:

Thanks for your quick response, I downloaded the ISIC tool and used the following command to identify the problem:

udpsic -s rand -d server-ip-address,port

where port is 514 (syslogd) which uses a python script to process the incoming messages.

The command 'netstat -lnup | grep 514' shows python as the bound application.

Thanks,
John
-----Original Message-----
From: Antoine Pitrou [mailto:report at bugs.python.org] 
Sent: Friday, January 27, 2012 12:47 PM
To: John Zimmerman (johzimme)
Subject: [issue13891] CPU DoS With Python's socket module

Antoine Pitrou <pitrou at free.fr> added the comment:

What do you call "malformed UDP packets" and how should they be detected by the library?

----------
nosy: +pitrou

_______________________________________
Python tracker <report at bugs.python.org>
<http://bugs.python.org/issue13891>
_______________________________________

----------

_______________________________________
Python tracker <report at bugs.python.org>
<http://bugs.python.org/issue13891>
_______________________________________


More information about the Python-bugs-list mailing list