Modes Of Introduction
Implementation : The uncontrolled recursion is often due to an improper or missing conditional
Applicable Platforms
Language
Class: Not Language-Specific (Undetermined)
Common Consequences
Scope |
Impact |
Likelihood |
Availability | DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory)
Note: Resources including CPU, memory, and stack memory could be rapidly consumed or exhausted, eventually leading to an exit or crash. | |
Confidentiality | Read Application Data
Note: In some cases, an application's interpreter might kill a process or thread that appears to be consuming too much resources, such as with PHP's memory_limit setting. When the interpreter kills the process/thread, it might report an error containing detailed information such as the application's installation path. | |
Observed Examples
References |
Description |
| Deeply nested arrays trigger stack exhaustion. |
| Self-referencing pointers create infinite loop and resultant stack exhaustion. |
| Javascript application accidentally changes input in a way that prevents a recursive call from detecting an exit condition. |
| An attempt to recover a corrupted XML file infinite recursion protection counter was not always incremented missing the exit condition. |
| USB-audio driver's descriptor code parsing allows unlimited recursion leading to stack exhaustion. |
Potential Mitigations
Phases : Implementation
Ensure an end condition will be reached under all logic conditions. The end condition may include testing against the depth of recursion and exiting with an error if the recursion goes too deep. The complexity of the end condition contributes to the effectiveness of this action.
Phases : Implementation
Increase the stack size.
Detection Methods
Automated Static Analysis
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
Effectiveness : High
Vulnerability Mapping Notes
Justification : This CWE entry is a Class and might have Base-level children that would be more appropriate
Comment : Examine children of this entry to see if there is a better fit
Related Attack Patterns
CAPEC-ID |
Attack Pattern Name |
CAPEC-230 |
Serialized Data with Nested Payloads Applications often need to transform data in and out of a data format (e.g., XML and YAML) by using a parser. It may be possible for an adversary to inject data that may have an adverse effect on the parser when it is being processed. Many data format languages allow the definition of macro-like structures that can be used to simplify the creation of complex structures. By nesting these structures, causing the data to be repeatedly substituted, an adversary can cause the parser to consume more resources while processing, causing excessive memory consumption and CPU utilization. |
CAPEC-231 |
Oversized Serialized Data Payloads An adversary injects oversized serialized data payloads into a parser during data processing to produce adverse effects upon the parser such as exhausting system resources and arbitrary code execution. |
References
REF-961
Automated Source Code Reliability Measure (ASCRM)
Object Management Group (OMG).
http://www.omg.org/spec/ASCRM/1.0/
Submission
Name |
Organization |
Date |
Date release |
Version |
CWE Content Team |
MITRE |
2008-04-11 +00:00 |
2008-04-11 +00:00 |
Draft 9 |
Modifications
Name |
Organization |
Date |
Comment |
Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Potential_Mitigations, Time_of_Introduction |
CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Common_Consequences, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2009-03-10 +00:00 |
updated Related_Attack_Patterns |
CWE Content Team |
MITRE |
2011-03-29 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences |
CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2012-10-30 +00:00 |
updated Potential_Mitigations |
CWE Content Team |
MITRE |
2013-02-21 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2014-02-18 +00:00 |
updated Related_Attack_Patterns |
CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Applicable_Platforms, Relationships |
CWE Content Team |
MITRE |
2019-01-03 +00:00 |
updated References, Related_Attack_Patterns, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2019-06-20 +00:00 |
updated Related_Attack_Patterns, Relationships, Type |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Related_Attack_Patterns, Relationships |
CWE Content Team |
MITRE |
2020-12-10 +00:00 |
updated Demonstrative_Examples, Description, Modes_of_Introduction, Observed_Examples, Potential_Mitigations, Time_of_Introduction |
CWE Content Team |
MITRE |
2021-03-15 +00:00 |
updated Potential_Mitigations |
CWE Content Team |
MITRE |
2022-10-13 +00:00 |
updated Demonstrative_Examples |
CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description, Relationships |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Detection_Factors, Relationships |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
CWE Content Team |
MITRE |
2024-02-29 +00:00 |
updated Demonstrative_Examples |