Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-409 (对高度压缩数据的处理不恰当(数据放大攻击)) — Vulnerability Class 39

39 vulnerabilities classified as CWE-409 (对高度压缩数据的处理不恰当(数据放大攻击)). AI Chinese analysis included.

CWE-409 represents a critical input validation weakness where software fails to adequately manage inputs with extreme compression ratios, leading to data amplification during decompression. Attackers typically exploit this vulnerability by crafting malicious archives, such as "decompression bombs," which are deceptively small but expand into massive amounts of data upon extraction. This exploitation can rapidly exhaust system memory, CPU resources, or disk space, resulting in denial-of-service conditions or application crashes. To mitigate this risk, developers must implement strict limits on decompression sizes and monitor resource consumption during the process. Effective defenses include setting maximum allowable output thresholds, using timeout mechanisms to halt prolonged decompression tasks, and validating input complexity before processing. By enforcing these constraints, organizations can prevent attackers from leveraging compression algorithms to overwhelm system resources and maintain service availability.

MITRE CWE Description
The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output. An example of data amplification is a "decompression bomb," a small ZIP file that can produce a large amount of data when it is decompressed.
Common Consequences (1)
AvailabilityDoS: Amplification, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory)
System resources, CPU and memory, can be quickly consumed. This can lead to poor system performance or system crash.
Examples (1)
The DTD and the very brief XML below illustrate what is meant by an XML bomb. The ZERO entity contains one character, the letter A. The choice of entity name ZERO is being used to indicate length equivalent to that exponent on two, that is, the length of ZERO is 2^0. Similarly, ONE refers to ZERO twice, therefore the XML parser will expand ONE to a length of 2, or 2^1. Ultimately, we reach entity …
<?xml version="1.0"?> <!DOCTYPE MaliciousDTD [ <!ENTITY ZERO "A"> <!ENTITY ONE "&ZERO;&ZERO;"> <!ENTITY TWO "&ONE;&ONE;"> ... <!ENTITY THIRTYTWO "&THIRTYONE;&THIRTYONE;"> ]> <data>&THIRTYTWO;</data>
Attack · XML

Vulnerabilities classified as CWE-409 (对高度压缩数据的处理不恰当(数据放大攻击)) represent 39 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.