CWE-772: Missing Release of Resource after Effective Lifetime

Description

The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.

Submission Date :

May 13, 2009, midnight

Modification Date :

2023-10-26 00:00:00+00:00

Organization :

MITRE
Extended Description

When a resource is not released after use, it can allow attackers to cause a denial of service by causing the allocation of resources without triggering their release. Frequently-affected resources include memory, CPU, disk space, power or battery, etc.

Example Vulnerable Codes

Example - 1

The following method never closes the new file handle. Given enough time, the Finalize() method for BufferReader should eventually call Close(), but there is no guarantee as to how long this action will take. In fact, there is no guarantee that Finalize() will ever be invoked. In a busy environment, the Operating System could use up all of the available file handles before the Close() function is called.



processLine(line);BufferReader fil = new BufferReader(new FileReader(fName));String line;while ((line = fil.ReadLine()) != null){}private void processFile(string fName){}

The good code example simply adds an explicit call to the Close() function when the system is done using the file. Within a simple example such as this the problem is easy to see and fix. In a real system, the problem may be considerably more obscure.



processLine(line);
BufferReader fil = new BufferReader(new FileReader(fName));String line;while ((line = fil.ReadLine()) != null){}fil.Close();private void processFile(string fName){}

Example - 2

The following code attempts to open a new connection to a database, process the results returned by the database, and close the allocated SqlConnection object.


SqlConnection conn = new SqlConnection(connString);SqlCommand cmd = new SqlCommand(queryString);cmd.Connection = conn;conn.Open();SqlDataReader rdr = cmd.ExecuteReader();HarvestResults(rdr);conn.Connection.Close();

The problem with the above code is that if an exception occurs while executing the SQL or processing the results, the SqlConnection object is not closed. If this happens often enough, the database will run out of available cursors and not be able to execute any more SQL queries.

Example - 3

This code attempts to open a connection to a database and catches any exceptions that may occur.

Connection con = DriverManager.getConnection(some_connection_string);
log( e );try {}catch ( Exception e ) {}

If an exception occurs after establishing the database connection and before the same connection closes, the pool of database connections may become exhausted. If the number of available connections is exceeded, other users cannot access this resource, effectively denying access to the application.

Example - 4

Under normal conditions the following C# code executes a database query, processes the results returned by the database, and closes the allocated SqlConnection object. But if an exception occurs while executing the SQL or processing the results, the SqlConnection object is not closed. If this happens often enough, the database will run out of available cursors and not be able to execute any more SQL queries.


...SqlConnection conn = new SqlConnection(connString);SqlCommand cmd = new SqlCommand(queryString);cmd.Connection = conn;conn.Open();SqlDataReader rdr = cmd.ExecuteReader();HarvestResults(rdr);conn.Connection.Close();...

Example - 5

The following C function does not close the file handle it opens if an error occurs. If the process is long-lived, the process can run out of file handles.



printf("cannot open %s\n", fName);return DECODE_FAIL;
return DECODE_FAIL;
decodeBlock(buf);if (!checkChecksum(buf)) {}else {}while (fgets(buf, BUF_SZ, f)) {}
char buf[BUF_SZ];FILE* f = fopen(fName, "r");if (!f) {}else {}fclose(f);return DECODE_SUCCESS;int decodeFile(char* fName) {}

Related Weaknesses

This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined to give an overview of the different insight to similar items that may exist at higher and lower levels of abstraction.

Visit http://cwe.mitre.org/ for more details.

© cvefeed.io
Latest DB Update: Nov. 21, 2024 22:40