Modes d'introduction
Implementation
Plateformes applicables
Langue
Name: C (Sometimes)
Name: C++ (Sometimes)
Class: Not Language-Specific (Undetermined)
Conséquences courantes
Portée |
Impact |
Probabilité |
Availability | DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
Note: An adversary that can cause a resource counter to become inaccurate may be able to create situations where resources are not accounted for and not released, thus causing resources to become scarce for future needs. | High |
Availability | DoS: Crash, Exit, or Restart
Note: An adversary that can cause a resource counter to become inaccurate may be able to force an error that causes the product to crash or exit out of its current operation. | Low |
Exemples observés
Références |
Description |
| chain: reference count is not decremented, leading to memory leak in OS by sending ICMP packets. |
| Reference count for shared memory not decremented when a function fails, potentially allowing unprivileged users to read kernel memory. |
| chain: improper reference count tracking leads to file descriptor consumption |
| chain: integer overflow in reference counter causes the same variable to be destroyed twice. |
| Incorrect reference count calculation leads to improper object destruction and code execution. |
| chain: incorrect update of reference count leads to memory leak. |
| chain/composite: use of incorrect data type for a reference counter allows an overflow of the counter, leading to a free of memory that is still in use. |
| Improper reference counting leads to failure of cryptographic operations. |
| chain: improper reference counting in a garbage collection routine leads to use-after-free |
| chain: reference count not correctly maintained when client disconnects during a large operation, leading to a use-after-free. |
| Reference count not always incremented, leading to crash or code execution. |
| improper reference counting leads to expired pointer dereference. |
| OS kernel increments reference count twice but only decrements once, leading to resource consumption and crash. |
| OS kernel driver allows code execution |
| improper reference counting leads to exhaustion of IP addresses |
| Race condition causes reference counter to be decremented prematurely, leading to the destruction of still-active object and an invalid pointer dereference. |
| improper reference counting leads to use-after-free |
Notes de cartographie des vulnérabilités
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commentaire : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Références
REF-884
Windows Kernel Reference Count Vulnerabilities - Case Study
Mateusz "j00ru" Jurczyk.
https://j00ru.vexillium.org/slides/2012/zeronights.pdf
Soumission
Nom |
Organisation |
Date |
Date de publication |
Version |
CWE Content Team |
MITRE |
2012-12-21 +00:00 |
2013-02-21 +00:00 |
2.4 |
Modifications
Nom |
Organisation |
Date |
Commentaire |
CWE Content Team |
MITRE |
2019-06-20 +00:00 |
updated Type |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships, Type |
CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated References, Relationships |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
CWE Content Team |
MITRE |
2025-04-03 +00:00 |
updated Common_Consequences |