-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Leon,

On 2/10/2011 6:03 PM, Leon Rosenberg wrote:
> short question, I read in the http://tomcat.apache.org/security-6.html
> that a possible DoS attack vulnerability has been fixed in Request
> class.
> Does that mean that CVE-2010-4476 is
> a) not an issue with 6.0.32++
> b) not an issue unless the app uses Double.parseDouble
> c) probably not in issue in tomcat, at least until someone finds out it is.

Tomcat uses Double.parseDouble in a few places that have not been
addressed, but they are used for parsing values supplied by the
administrator or webapp developer (like parsing the <web-app> version
string, for instance). This appears to be the only use of
Double.parseDouble in Tomcat that could really be considered vulnerable.

If you want to protect yourself entirely, consider upgrading or using
the "fpupdate" program which patches your installation's rt.jar file. I
have done this on all my servers.

If you want to protect yourself on all Tomcat versions but still be
vulnerable to application use of Double.parseDouble, see my followups to
Mark's announcement this week: I show you how to protect Tomcat using
two different techniques with Apache httpd... these could easily be
adapted to use UrlRewrite if you aren't using a web server in front of
Tomcat.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk1VY4IACgkQ9CaO5/Lv0PDGXACfcstSTQ/4uZCaQ4EL6+4S0Rl+
V8YAoIkZqeq7rdXbwSi7bQs85ndmO0r+
=6h/3
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to