On Fri, Feb 11, 2011 at 6:21 PM, Brian Chess <br...@fortify.com> wrote:
> There's a very interesting vulnerability in Java kicking around.  I wrote 
> about it here:
>  http://blog.fortify.com/blog/2011/02/08/Double-Trouble
A lot of chatter about it on FD:
http://seclists.org/fulldisclosure/2011/Feb/220.

DiKKy had an interesting take on it
(http://seclists.org/fulldisclosure/2011/Feb/227):

    Breakin' f**kin' news! [sic]  (Or not!)  One of those stories is over
    a month old, the other is over a week old.  Nothing particularly
    exciting or unexpected in either.  It's just typical GPL code quality.

> In brief, you can send Java (and some versions of PHP) into an
> infinite loop if you can provide some malicious input that will be
> parsed as a double-precision floating point number.
>
> This code used to look like the beginnings of some decent input validation:
>   Double.parseDouble(request.getParameter("d"));
> Now it's the gateway to an easy DOS attack.  (At least
> until you get a patch from your Java vendor, many of whom haven't
> released patches yet.  Oracle has released a patch.  Do you have it?)
>
> Until a few days ago, all major releases of Tomcat made matters
> worse by treating part of the Accept-Language header as a double.
> In other words, you don't need to have any double-precision values
> in *your* code for your app to be vulnerable.
>
> The SC-L corner of the world puts a lot of emphasis on training and on
> looking for known categories of vulnerabilities. That's all goodness.
> But this example highlights the fact that we have to build systems and
> procedures that can quickly adapt to address new risks.
There's not a lot anyone can do when the folks who arguably need the
guidance and help don't listen :(

Jeff

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to