[issue13891] CPU DoS With Python's socket module
John Zimmerman
report at bugs.python.org
Fri Jan 27 18:59:27 CET 2012
John Zimmerman <johzimme at cisco.com> added the comment:
Thanks for your quick response, I downloaded the ISIC tool and used the following command to identify the problem:
udpsic -s rand -d server-ip-address,port
where port is 514 (syslogd) which uses a python script to process the incoming messages.
The command 'netstat -lnup | grep 514' shows python as the bound application.
Thanks,
John
-----Original Message-----
From: Antoine Pitrou [mailto:report at bugs.python.org]
Sent: Friday, January 27, 2012 12:47 PM
To: John Zimmerman (johzimme)
Subject: [issue13891] CPU DoS With Python's socket module
Antoine Pitrou <pitrou at free.fr> added the comment:
What do you call "malformed UDP packets" and how should they be detected by the library?
----------
nosy: +pitrou
_______________________________________
Python tracker <report at bugs.python.org>
<http://bugs.python.org/issue13891>
_______________________________________
----------
_______________________________________
Python tracker <report at bugs.python.org>
<http://bugs.python.org/issue13891>
_______________________________________
More information about the Python-bugs-list
mailing list