Modes Of Introduction
Implementation
Applicable Platforms
Language
Name: C (Sometimes)
Name: C++ (Sometimes)
Class: Not Language-Specific (Undetermined)
Observed Examples
References |
Description |
| chain: reference count is not decremented, leading to memory leak in OS by sending ICMP packets. |
| Reference count for shared memory not decremented when a function fails, potentially allowing unprivileged users to read kernel memory. |
| chain: improper reference count tracking leads to file descriptor consumption |
| chain: integer overflow in reference counter causes the same variable to be destroyed twice. |
| Incorrect reference count calculation leads to improper object destruction and code execution. |
| chain: incorrect update of reference count leads to memory leak. |
| chain/composite: use of incorrect data type for a reference counter allows an overflow of the counter, leading to a free of memory that is still in use. |
| Improper reference counting leads to failure of cryptographic operations. |
| chain: improper reference counting in a garbage collection routine leads to use-after-free |
| chain: reference count not correctly maintained when client disconnects during a large operation, leading to a use-after-free. |
| Reference count not always incremented, leading to crash or code execution. |
| improper reference counting leads to expired pointer dereference. |
| OS kernel increments reference count twice but only decrements once, leading to resource consumption and crash. |
| OS kernel driver allows code execution |
| improper reference counting leads to exhaustion of IP addresses |
| Race condition causes reference counter to be decremented prematurely, leading to the destruction of still-active object and an invalid pointer dereference. |
| improper reference counting leads to use-after-free |
Vulnerability Mapping Notes
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
References
REF-884
Windows Kernel Reference Count Vulnerabilities - Case Study
Mateusz "j00ru" Jurczyk.
https://j00ru.vexillium.org/slides/2012/zeronights.pdf
Submission
Name |
Organization |
Date |
Date release |
Version |
CWE Content Team |
MITRE |
2012-12-21 +00:00 |
2013-02-21 +00:00 |
2.4 |
Modifications
Name |
Organization |
Date |
Comment |
CWE Content Team |
MITRE |
2019-06-20 +00:00 |
updated Type |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships, Type |
CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated References, Relationships |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |