Date: 10 February 2011
References: ESB-2011.0158 ESB-2011.0159 ESB-2011.0160 ESB-2011.0161 ESB-2011.0165.2 ASB-2011.0016 ESB-2011.0192 ESB-2011.0194 ESB-2011.0195 ESB-2011.0206.2 ESB-2011.0210 ESB-2011.0259 ESB-2011.0272 ESB-2011.0274 ESB-2011.0279 ESB-2011.0280 ESB-2011.0281 ESB-2011.0282 ESB-2011.0435 ESB-2011.0498 ESB-2011.0715 ASB-2011.0070 ESB-2011.0902 ESB-2011.1090.4 ESB-2011.1177 ESB-2012.0383 ESB-2012.0423 ESB-2012.0474
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT Security Bulletin
ASB-2011.0013
Denial of Service vulnerability in the Java Runtime Environment
10 February 2011
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: JDK and JRE 6 Update 23 and earlier for Windows, Solaris, and Linux
JDK 5.0 Update 27 and earlier for Solaris 9
SDK 1.4.2_29 and earlier for Solaris 8
JDK and JRE 6 Update 23 and earlier for Windows, Solaris and Linux
JDK and JRE 5.0 Update 27 and earlier for Windows, Solaris and Linux
SDK and JRE 1.4.2_29 and earlier for Windows, Solaris and Linux
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2010-4476
Member content until: Saturday, March 12 2011
OVERVIEW
Oracle has announced details of a Denial of Service vulnerability in
the Java Runtime Environment (JRE).
IMPACT
Oracle has provided the following description of the vulnerability:
"This Security Alert addresses security issue CVE-2010-4476 (Java
Runtime Environment hangs when converting "2.2250738585072012e-308" to
a binary floating-point number), which is a vulnerability in the Java
Runtime Environment component of the Oracle Java SE and Java for
Business products. This vulnerability allows unauthenticated network
attacks ( i.e. it may be exploited over a network without the need for
a username and password). Successful attack of this vulnerability can
result in unauthorized ability to cause a hang or frequently repeatable
crash (complete Denial of Service) of the Java Runtime Environment.
Java based application and web servers are especially at risk from
this vulnerability." [1]
MITIGATION
Oracle advises those using affected versions of Java upgrade to
appropriate newer versions outlined in their document. [1]
It is expected that other vendors who package Java will update their
packages shortly to resolve this vulnerability.
REFERENCES
[1] Oracle Security Alert for CVE-2010-4476
http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFNU2cR/iFOrG6YcBERAtRLAKCZnRqmKotKCuEwwu/hDxkrjfFjJgCfRe2r
Q4w08b/zyMXkKzyQw+rh2mI=
=Gszn
-----END PGP SIGNATURE-----
|