This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Early Amplification"
From OWASP
| Line 1: | Line 1: | ||
{{Template:Vulnerability}} | {{Template:Vulnerability}} | ||
| + | {{Template:Stub}} | ||
[[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]] | [[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]] | ||
| − | + | ||
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
| Line 14: | Line 15: | ||
==Description== | ==Description== | ||
| − | + | Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed. | |
| + | |||
| + | PLOVER Early Amplification. | ||
| − | + | * Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly | |
| − | |||
| − | |||
| − | |||
==Risk Factors== | ==Risk Factors== | ||
| − | + | TBD | |
| − | |||
| − | |||
| − | |||
==Examples== | ==Examples== | ||
| − | + | TBD | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
==Related [[Attacks]]== | ==Related [[Attacks]]== | ||
| − | * [[ | + | * [[Denial of Service]] |
| − | |||
| Line 48: | Line 38: | ||
* [[Vulnerability 1]] | * [[Vulnerability 1]] | ||
* [[Vulnerabiltiy 2]] | * [[Vulnerabiltiy 2]] | ||
| − | |||
| − | |||
| Line 56: | Line 44: | ||
* [[Control 1]] | * [[Control 1]] | ||
* [[Control 2]] | * [[Control 2]] | ||
| − | |||
| − | |||
| Line 67: | Line 53: | ||
==References== | ==References== | ||
| − | + | TBD | |
| − | |||
| − | |||
| − | |||
| − | |||
[[Category:FIXME|add links | [[Category:FIXME|add links | ||
| Line 103: | Line 85: | ||
[[Category:OWASP ASDR Project]] | [[Category:OWASP ASDR Project]] | ||
| − | + | [:Category:Authentication]] | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
[[:Category:Access Control]] | [[:Category:Access Control]] | ||
| − | |||
| − | |||
| − | |||
[[Category:Access Control Vulnerability]] | [[Category:Access Control Vulnerability]] | ||
| − | |||
Revision as of 23:31, 23 September 2008
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
Last revision (mm/dd/yy): 09/23/2008
Vulnerabilities Table of Contents
Description
Allows a legitimate but expensive operation before the entity has proven that the operation should be allowed.
PLOVER Early Amplification.
- Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly
Risk Factors
TBD
Examples
TBD
Related Attacks
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
TBD [:Category:Authentication]] Category:Access Control