Vulnerabilidad en el método Double.parseDouble en Java Runtime Environment (JRE) en Oracle Java SE y Java for Business (CVE-2010-4476)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
17/02/2011
Última modificación:
11/04/2025
Descripción
El método Double.parseDouble en Java Runtime Environment (JRE) en Oracle Java SE y Java para Business 6 Update 23 y versiones anteriores, 5.0 Update 27 y versiones anteriores y 1.4.2_29 y versiones anteriores, tal como se utiliza en OpenJDK, Apache, JBossweb y otros productos , permite a atacantes remotos provocar una denegación de servicio a través de una cadena manipulada que desencadena un bucle infinito de estimaciones durante la conversión a un número de coma flotante binario de doble precisión, como se demuestra usando 2.2250738585072012e-308.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:* | 1.6.0 (incluyendo) | |
| cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:* | ||
| cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://blog.fortify.com/blog/2011/02/08/Double-Trouble
- http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html
- http://marc.info/?l=bugtraq&m=129899347607632&w=2
- http://marc.info/?l=bugtraq&m=129899347607632&w=2
- http://marc.info/?l=bugtraq&m=129960314701922&w=2
- http://marc.info/?l=bugtraq&m=129960314701922&w=2
- http://marc.info/?l=bugtraq&m=130168502603566&w=2
- http://marc.info/?l=bugtraq&m=130270785502599&w=2
- http://marc.info/?l=bugtraq&m=130497132406206&w=2
- http://marc.info/?l=bugtraq&m=130497185606818&w=2
- http://marc.info/?l=bugtraq&m=130514352726432&w=2
- http://marc.info/?l=bugtraq&m=130514352726432&w=2
- http://marc.info/?l=bugtraq&m=131041767210772&w=2
- http://marc.info/?l=bugtraq&m=131041767210772&w=2
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=133728004526190&w=2
- http://marc.info/?l=bugtraq&m=133728004526190&w=2
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://secunia.com/advisories/43048
- http://secunia.com/advisories/43280
- http://secunia.com/advisories/43295
- http://secunia.com/advisories/43304
- http://secunia.com/advisories/43333
- http://secunia.com/advisories/43378
- http://secunia.com/advisories/43400
- http://secunia.com/advisories/43659
- http://secunia.com/advisories/44954
- http://secunia.com/advisories/45022
- http://secunia.com/advisories/45555
- http://secunia.com/advisories/49198
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423
- http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983
- http://www-01.ibm.com/support/docview.wss?uid=swg21468358
- http://www.debian.org/security/2011/dsa-2161
- http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/
- http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html
- http://www.ibm.com/support/docview.wss?uid=swg24029497
- http://www.ibm.com/support/docview.wss?uid=swg24029498
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A054
- http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html
- http://www.redhat.com/support/errata/RHSA-2011-0210.html
- http://www.redhat.com/support/errata/RHSA-2011-0211.html
- http://www.redhat.com/support/errata/RHSA-2011-0212.html
- http://www.redhat.com/support/errata/RHSA-2011-0213.html
- http://www.redhat.com/support/errata/RHSA-2011-0214.html
- http://www.redhat.com/support/errata/RHSA-2011-0282.html
- http://www.redhat.com/support/errata/RHSA-2011-0333.html
- http://www.redhat.com/support/errata/RHSA-2011-0334.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.securitytracker.com/id?1025062=
- http://www.vupen.com/english/advisories/2011/0365
- http://www.vupen.com/english/advisories/2011/0377
- http://www.vupen.com/english/advisories/2011/0379
- http://www.vupen.com/english/advisories/2011/0422
- http://www.vupen.com/english/advisories/2011/0434
- http://www.vupen.com/english/advisories/2011/0605
- http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627%201298159618320%2028353475
- http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627%201298159618320%2028353475
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493
- http://blog.fortify.com/blog/2011/02/08/Double-Trouble
- http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html
- http://marc.info/?l=bugtraq&m=129899347607632&w=2
- http://marc.info/?l=bugtraq&m=129899347607632&w=2
- http://marc.info/?l=bugtraq&m=129960314701922&w=2
- http://marc.info/?l=bugtraq&m=129960314701922&w=2
- http://marc.info/?l=bugtraq&m=130168502603566&w=2
- http://marc.info/?l=bugtraq&m=130270785502599&w=2
- http://marc.info/?l=bugtraq&m=130497132406206&w=2
- http://marc.info/?l=bugtraq&m=130497185606818&w=2
- http://marc.info/?l=bugtraq&m=130514352726432&w=2
- http://marc.info/?l=bugtraq&m=130514352726432&w=2
- http://marc.info/?l=bugtraq&m=131041767210772&w=2
- http://marc.info/?l=bugtraq&m=131041767210772&w=2
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=132215163318824&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=133469267822771&w=2
- http://marc.info/?l=bugtraq&m=133728004526190&w=2
- http://marc.info/?l=bugtraq&m=133728004526190&w=2
- http://marc.info/?l=bugtraq&m=134254866602253&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://marc.info/?l=bugtraq&m=134254957702612&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://marc.info/?l=bugtraq&m=136485229118404&w=2
- http://secunia.com/advisories/43048
- http://secunia.com/advisories/43280
- http://secunia.com/advisories/43295
- http://secunia.com/advisories/43304
- http://secunia.com/advisories/43333
- http://secunia.com/advisories/43378
- http://secunia.com/advisories/43400
- http://secunia.com/advisories/43659
- http://secunia.com/advisories/44954
- http://secunia.com/advisories/45022
- http://secunia.com/advisories/45555
- http://secunia.com/advisories/49198
- http://security.gentoo.org/glsa/glsa-201406-32.xml
- http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423
- http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983
- http://www-01.ibm.com/support/docview.wss?uid=swg21468358
- http://www.debian.org/security/2011/dsa-2161
- http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/
- http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html
- http://www.ibm.com/support/docview.wss?uid=swg24029497
- http://www.ibm.com/support/docview.wss?uid=swg24029498
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A054
- http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html
- http://www.redhat.com/support/errata/RHSA-2011-0210.html
- http://www.redhat.com/support/errata/RHSA-2011-0211.html
- http://www.redhat.com/support/errata/RHSA-2011-0212.html
- http://www.redhat.com/support/errata/RHSA-2011-0213.html
- http://www.redhat.com/support/errata/RHSA-2011-0214.html
- http://www.redhat.com/support/errata/RHSA-2011-0282.html
- http://www.redhat.com/support/errata/RHSA-2011-0333.html
- http://www.redhat.com/support/errata/RHSA-2011-0334.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.securitytracker.com/id?1025062=
- http://www.vupen.com/english/advisories/2011/0365
- http://www.vupen.com/english/advisories/2011/0377
- http://www.vupen.com/english/advisories/2011/0379
- http://www.vupen.com/english/advisories/2011/0422
- http://www.vupen.com/english/advisories/2011/0434
- http://www.vupen.com/english/advisories/2011/0605
- http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627%201298159618320%2028353475
- http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627%201298159618320%2028353475
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493



