Hey Brian,

I think it's critical that we discuss these issues with prescriptive
remediation advice.

1) Update your JVM, often easier said then done
2) Build a blacklist filter looking for this specific numerical attack
range. I already patched this in the ESAPI for Java security library
which you will see in ESAPI 2.0 rc12 within a week or 2, but the
credit goes to Adobe for being on top of this (and to Williams for
pointing this out to me).

http://blogs.adobe.com/asset/2011/02/year-of-the-snail.html

I'm impressed team Adobe!

-Jim Manico
http://manico.net

On Feb 12, 2011, at 10:13 PM, Brian Chess <br...@fortify.com> wrote:

> There's a very interesting vulnerability in Java kicking around.  I wrote 
> about it here:
>  http://blog.fortify.com/blog/2011/02/08/Double-Trouble
>
> In brief, you can send Java (and some versions of PHP) into an infinite loop 
> if you can provide some malicious input that will be parsed as a 
> double-precision floating point number.
>
> This code used to look like the beginnings of some decent input validation:
>   Double.parseDouble(request.getParameter("d"));
> Now it's the gateway to an easy DOS attack.  (At least until you get a patch 
> from your Java vendor, many of whom haven't released patches yet.  Oracle has 
> released a patch.  Do you have it?)
>
> Until a few days ago, all major releases of Tomcat made matters worse by 
> treating part of the Accept-Language header as a double.  In other words, you 
> don't need to have any double-precision values in *your* code for your app to 
> be vulnerable.
>
> The SC-L corner of the world puts a lot of emphasis on training and on 
> looking for known categories of vulnerabilities.  That's all goodness.  But 
> this example highlights the fact that we have to build systems and procedures 
> that can quickly adapt to address new risks.
>
> Brian
> _______________________________________________
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
> _______________________________________________

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to