Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

CVE-2010-4476 [CVE 2008 ] reports a vulnerability in the Double.parseDouble() method in Java 1.6 update 23 and earlier, Java 1.5 update 27 and earlier, and 1.4.2_29 and earlier. This vulnerability causes a denial of service when this method is passed a crafted string argument. The value 2.2250738585072012e-308 is close to the minimum normalized, positivpositive, e double-precision floating-point number, and ; when encoded as a string , it triggers an infinite loop of estimations during conversion to a normalized or denormalized double.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="99ca464e815bb265-86b60ca4-41b3497e-9c3e9d44-96da98c05de3beacc24e4a87"><ac:plain-text-body><![CDATA[

[[Bryant 2003

AA. References#Bryant 03]]

Computer Systems: A Programmer's Perspective, Section 2.4, Floating Point

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6d5cae6bcffe7fca-e58793a6-46c14334-89e3a2db-b8850eb901b56d361cb0d977"><ac:plain-text-body><![CDATA[

[[CVE 2008

AA. References#CVE 08]]

[CVE-2010-4476

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b71a577771c2c0bc-9870f6a9-44cc4604-baa68996-55658a56246d6401989a4779"><ac:plain-text-body><![CDATA[

[[IEEE 754

AA. References#IEEE 754 2006]]

 

]]></ac:plain-text-body></ac:structured-macro>

...