Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-4476

Опубликовано: 17 фев. 2011
Источник: debian
EPSS Средний

Описание

The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openjdk-6fixed6b18-1.8.7-1package
sun-java6no-dsalennypackage
sun-java6no-dsasqueezepackage
sun-java6fixed6.24-1package

Примечания

  • Patch http://mail.openjdk.java.net/pipermail/core-libs-dev/2011-February/005795.html

  • Oracle http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html

  • Original report http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/

EPSS

Процентиль: 97%
0.44456
Средний

Связанные уязвимости

ubuntu
больше 14 лет назад

The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.

redhat
больше 14 лет назад

The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.

nvd
больше 14 лет назад

The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.

github
около 3 лет назад

Apache Tomcat affected by infinite loop in Double.parseDouble method in Java Runtime Environment

oracle-oval
больше 14 лет назад

ELSA-2011-0336: tomcat5 security update (IMPORTANT)

EPSS

Процентиль: 97%
0.44456
Средний