treforbenbow commited on
Commit
c8e73e5
·
verified ·
1 Parent(s): 10192fd

Upload README.md with huggingface_hub

Browse files
Files changed (1) hide show
  1. README.md +46 -0
README.md ADDED
@@ -0,0 +1,46 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # TensorRT VULN-004: Input-Controlled DoS via While-Loop Models
2
+
3
+ ## Vulnerability
4
+
5
+ A structurally valid ONNX model (351 bytes) using a condition-dependent Loop
6
+ operator hangs indefinitely during TensorRT inference when given a malicious
7
+ input value. The model works correctly with normal inputs but hangs permanently
8
+ with extreme inputs.
9
+
10
+ ## Distinct from VULN-003
11
+
12
+ - VULN-003: Malicious MODEL with static INT64_MAX trip count
13
+ - VULN-004: Normal MODEL + malicious INPUT data
14
+ - VULN-003 fix (validate max_trip_count) does NOT prevent this
15
+ - Requires runtime protection: inference timeout / iteration budget
16
+
17
+ ## Impact
18
+
19
+ - Input-controlled DoS for any TRT model using while-loops
20
+ - Attacker only needs to send a single malicious float value
21
+ - Affects Triton, TensorRT-LLM, any TRT-based pipeline
22
+ - Model is structurally valid -- cannot be detected by static analysis
23
+
24
+ ## Files
25
+
26
+ | File | Description |
27
+ |------|-------------|
28
+ | vuln004_input_dos.py | Main PoC script |
29
+ | while_loop.onnx | While-loop ONNX model (351 bytes) |
30
+ | while_loop.engine | Compiled TRT engine (11,124 bytes) |
31
+
32
+ ## Reproduction
33
+
34
+ ```bash
35
+ pip install tensorrt onnx torch numpy
36
+ python vuln004_input_dos.py
37
+ ```
38
+
39
+ ## Results
40
+
41
+ - counter=10: completes in 0.001s
42
+ - counter=1000: completes in 0.055s
43
+ - counter=1e6: HANGS indefinitely
44
+ - counter=1e30: HANGS indefinitely
45
+ - counter=FLT_MAX: HANGS indefinitely
46
+ - No timeout, no warning, no error