Difference between revisions of "Early Amplification"
From OWASP
Line 1: | Line 1: | ||
{{Template:Vulnerability}} | {{Template:Vulnerability}} | ||
+ | {{Template:Stub}} | ||
[[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]] | [[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]] | ||
− | + | ||
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
Line 14: | Line 15: | ||
==Description== | ==Description== | ||
− | + | Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed. | |
+ | |||
+ | PLOVER Early Amplification. | ||
− | + | * Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly | |
− | |||
− | |||
− | |||
==Risk Factors== | ==Risk Factors== | ||
− | + | TBD | |
− | |||
− | |||
− | |||
==Examples== | ==Examples== | ||
− | + | TBD | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Related [[Attacks]]== | ==Related [[Attacks]]== | ||
− | * [[ | + | * [[Denial of Service]] |
− | |||
Line 48: | Line 38: | ||
* [[Vulnerability 1]] | * [[Vulnerability 1]] | ||
* [[Vulnerabiltiy 2]] | * [[Vulnerabiltiy 2]] | ||
− | |||
− | |||
Line 56: | Line 44: | ||
* [[Control 1]] | * [[Control 1]] | ||
* [[Control 2]] | * [[Control 2]] | ||
− | |||
− | |||
Line 67: | Line 53: | ||
==References== | ==References== | ||
− | + | TBD | |
− | |||
− | |||
− | |||
− | |||
[[Category:FIXME|add links | [[Category:FIXME|add links | ||
Line 103: | Line 85: | ||
[[Category:OWASP ASDR Project]] | [[Category:OWASP ASDR Project]] | ||
− | + | [:Category:Authentication]] | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
[[:Category:Access Control]] | [[:Category:Access Control]] | ||
− | |||
− | |||
− | |||
[[Category:Access Control Vulnerability]] | [[Category:Access Control Vulnerability]] | ||
− |
Revision as of 23:31, 23 September 2008
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
Last revision (mm/dd/yy): 09/23/2008
Vulnerabilities Table of Contents
Contents
Description
Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.
- Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
Risk Factors
TBD
Examples
TBD
Related Attacks
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
TBD [:Category:Authentication]] Category:Access Control