On Fri, Feb 11, 2011 at 6:21 PM, Brian Chess <br...@fortify.com> wrote: > There's a very interesting vulnerability in Java kicking around. I wrote > about it here: > http://blog.fortify.com/blog/2011/02/08/Double-Trouble A lot of chatter about it on FD: http://seclists.org/fulldisclosure/2011/Feb/220.
DiKKy had an interesting take on it (http://seclists.org/fulldisclosure/2011/Feb/227): Breakin' f**kin' news! [sic] (Or not!) One of those stories is over a month old, the other is over a week old. Nothing particularly exciting or unexpected in either. It's just typical GPL code quality. > In brief, you can send Java (and some versions of PHP) into an > infinite loop if you can provide some malicious input that will be > parsed as a double-precision floating point number. > > This code used to look like the beginnings of some decent input validation: > Double.parseDouble(request.getParameter("d")); > Now it's the gateway to an easy DOS attack. (At least > until you get a patch from your Java vendor, many of whom haven't > released patches yet. Oracle has released a patch. Do you have it?) > > Until a few days ago, all major releases of Tomcat made matters > worse by treating part of the Accept-Language header as a double. > In other words, you don't need to have any double-precision values > in *your* code for your app to be vulnerable. > > The SC-L corner of the world puts a lot of emphasis on training and on > looking for known categories of vulnerabilities. That's all goodness. > But this example highlights the fact that we have to build systems and > procedures that can quickly adapt to address new risks. There's not a lot anyone can do when the folks who arguably need the guidance and help don't listen :( Jeff _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________