CVE-2010-4476

CVE Details

Release Date:2011-02-17
Impact:Important What is this?

Description


The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.

See more information about CVE-2010-4476 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 5.0
Vector String: AV:N/AC:L/Au:N/C:N/I:N/A:P
Version: 2.0
Attack Vector: Network
Attack Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (java-1.6.0-openjdk)ELSA-2011-02142011-02-11
Oracle Linux version 5 (tomcat5)ELSA-2011-03362011-03-09
Oracle Linux version 6 (java-1.6.0-openjdk)ELSA-2011-02142011-02-11
Oracle Linux version 6 (tomcat6)ELSA-2011-03352011-03-09


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete