Hey Jim-
  Just a quick comment on black-listing... I think Brian already mentioned it 
in his blog post but there are MANY variations of the magic number (range) so 
black-listing may be even tougher than updating the JVM, in my humble opinion. 

Rafał Łoś
InfoSec Specialist & Blogger

________________________

On 2011-02-13 16:24:59 GMT James Manico <j...@manico.net> wrote:

> 
> Hey Brian,
> 
> I think it's critical that we discuss these issues with prescriptive
> remediation advice.
> 
> 1) Update your JVM, often easier said then done
> 2) Build a blacklist filter looking for this specific numerical attack
> range. I already patched this in the ESAPI for Java security library
> which you will see in ESAPI 2.0 rc12 within a week or 2, but the
> credit goes to Adobe for being on top of this (and to Williams for
> pointing this out to me).
> 
> http://blogs.adobe.com/asset/2011/02/year-of-the-snail.html
> 
> I'm impressed team Adobe!
> 
> -Jim Manico
> http://manico.net
> 
> On Feb 12, 2011, at 10:13 PM, Brian Chess <br...@fortify.com> wrote:
> 
>> There's a very interesting vulnerability in Java kicking around.  I wrote 
>> about it here:
>>   http://blog.fortify.com/blog/2011/02/08/Double-Trouble
>> 
>> In brief, you can send Java (and some versions of PHP) into an infinite 
>> loop if you can provide some malicious input that will be parsed as a 
>> double-precision floating point number.
>> 
>> This code used to look like the beginnings of some decent input validation:
>>    Double.parseDouble(request.getParameter("d"));
>> Now it's the gateway to an easy DOS attack.  (At least until you get a 
>> patch from your Java vendor, many of whom haven't released patches yet. 
>> Oracle has released a patch.  Do you have it?)
>> 
>> Until a few days ago, all major releases of Tomcat made matters worse by 
>> treating part of the Accept-Language header as a double.  In other words, 
>> you don't need to have any double-precision values in *your* code for your 
>> app to be vulnerable.
>> 
>> The SC-L corner of the world puts a lot of emphasis on training and on 
>> looking for known categories of vulnerabilities.  That's all goodness.  But 
>> this example highlights the fact that we have to build systems and 
>> procedures that can quickly adapt to address new risks.
>> 
>> Brian
>> _______________________________________________
>> Secure Coding mailing list (SC-L) SC-L@securecoding.org
>> List information, subscriptions, etc - 
>> http://krvw.com/mailman/listinfo/sc-l
>> List charter available at - http://www.securecoding.org/list/charter.php
>> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
>> as a free, non-commercial service to the software security community.
>> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
>> _______________________________________________
> 
> _______________________________________________
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
> _______________________________________________
> 


_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to