| Summary: | Vulnerable to "Double.parse" DOS attack? | ||
|---|---|---|---|
| Product: | Community | Reporter: | David Williams <david_williams> |
| Component: | Servers | Assignee: | Eclipse Webmaster <webmaster> |
| Status: | RESOLVED WONTFIX | QA Contact: | |
| Severity: | normal | ||
| Priority: | P3 | CC: | denis.roy, thanh.ha, wayne.beaton |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | PC | ||
| OS: | Linux | ||
| Whiteboard: | |||
|
Description
David Williams
Thanks for the report. Our java packages come from SuSE, so I'm surprised they haven't patched this yet. If I didn't trust our committers, who have the ability to write and run code on our servers, I'd be patching this myself. In this case, someone would have to be able to inject that value into running code for that code to crash. Perhaps help.eclipse.org and hudson present a higher degree of vulnerability, but both of those crash often enough on their own without external help that it doesn't make a difference :-D I'll track down the CVE with Novell to see where they're at. What is our status? Is it time to remove the "committers-only" flag? Do we consider this an "Eclipse" security flaw? (i.e. should we add the "security" flag to this bug?) (In reply to comment #2) > Do we > consider this an "Eclipse" security flaw? (i.e. should we add the "security" > flag to this bug?) I thought we should, simply because if there is an "app" somewhere, (help? hudson?) that under the covers does a Double.parseDouble(...) with user input, then Eclipse would be vulnerable. I know of no way to determine that ... though admit it would be unlikely ... so think it is "advertising" the potential vulnerability, unless/until we now the JREs are the up to date patched versions. We have a bunch of old JRE/JDK installs in /shared/common which are likely vulnerable. We'd have to consider purging those too. Since this apparently doesn't require any attention or fix ... I'm going to close as "won't fix". I would not make it "open", though, since that'd just be broadcasting the "challenge" that there might be an exposure somewhere. Feel free to re-open if I have misunderstood. I'm not sure why you would close a webmaster bug as WONTFIX. From my previous comment, there are a bunch of older Java VMs kicking around on /shared. All of them are likely vulnerable, but none of them are likely going to be patched. Since we can't just remove them (since we'll likely break something), how do you suggest we fix this? (In reply to Denis Roy from comment #6) > I'm not sure why you would close a webmaster bug as WONTFIX. > Sorry, I misunderstood. I thought you said once a security bug that doesn't have to be fixed in a month, doesn't need to be fixed -- bug 411132 comment 5. I closed it as it just happened to pop up on some other queries I was doing, so thought I'd be "helpful" and close it since it was so old. (And, since I opened it.) > ..." none of them are likely going to be patched" Sounds like "won't fix" to me. I do not know of anyway to fix this, other than what Oracle recommends. Can't argue with that. I re-read the CVE, and all it can do is crash. If someone manages to exploit this and begins crashing some web app, we'll deal with it then. "Successful attack of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete Denial of Service) of the Java Runtime Environment. Java based application and web servers are especially at risk from this vulnerability." Bug 411132 does expose a larger concern of maintaining older versions of Java on /shared, but again, should a security vulnerability be discovered that puts us at greater risk, we'll do what we need to do to eliminate the risk then deal with the wake. > I would not make it "open", though, since that'd just
> be broadcasting the "challenge" that there might be an exposure somewhere.
I'd do the opposite -- I'd invite someone to write some code that exploits it, submits it to Gerrit where it gets picked up by the Gerrit plugin, builds it, executes it, and successfully takes down Hudson or a HIPP instance.
If no one can do that, maybe I'll change my mind that the Gerrit plugin is pure madness.
|