Multiple vendor applications have been reported prone to algorithmic complexity denial of service attacks. The problem occurs due to the known or predictable use of weak hashing algorithms. By calculating a specially constructed attack, using low amounts of data, an attacker may be capable of triggering a denial of service within a target application. This may be due to the algorithm experiencing its worst case scenario calculations for a large period of time. ** Sun Java 1.4.1 releases are reported to be affected by this issue. Deterministic hashing appears to be part of the language specification for 1.4.1 and possibly other releases.
Multiple vendor applications have been reported prone to algorithmic complexity denial of service attacks. The problem occurs due to the known or predictable use of weak hashing algorithms. By calculating a specially constructed attack, using low amounts of data, an attacker may be capable of triggering a denial of service within a target application. This may be due to the algorithm experiencing its worst case scenario calculations for a large period of time. ** Sun Java 1.4.1 releases are reported to be affected by this issue. Deterministic hashing appears to be part of the language specification for 1.4.1 and possibly other releases.