Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2022-4896 Control de Ciber 资源管理错误漏洞 — Control de Ciber 8.2 High2023-09-12
CVE-2023-40584 Denial of Service to Argo CD repo-server — argo-cd 6.5 Medium2023-09-07
CVE-2023-40591 Denial of service via malicious p2p message in go-ethereum — go-ethereum 7.5 High2023-09-06
CVE-2023-40593 Denial of Service (DoS) in Splunk Enterprise Using a Malformed SAML Request — Splunk Enterprise 6.3 Medium2023-08-30
CVE-2023-40594 Denial of Service (DoS) via the ‘printf’ Search Function — Splunk Enterprise 6.5 Medium2023-08-30
CVE-2023-40586 go package github.com/corazawaf/coraza is vulnerable to denial of service — coraza 7.5 High2023-08-25
CVE-2023-40583 libp2p nodes vulnerable to OOM attack — go-libp2p 7.5 High2023-08-25
CVE-2023-37379 Apache Airflow: Exposure of sensitive connection information, DOS and SSRF on "test connection" feature — Apache Airflow 8.1 -2023-08-23
CVE-2023-4394 Memory leak in btrfs_get_dev_args_from_path() — Kernel 6.7 Medium2023-08-17
CVE-2023-38741 IBM TXSeries for Multiplatforms denial of service — TXSeries for Multiplatforms 7.5 High2023-08-14
CVE-2023-38210 Other | Uncontrolled Resource Consumption (CWE-400) — XMP Toolkit 5.5 Medium2023-08-10
CVE-2023-38178 .NET Core and Visual Studio Denial of Service Vulnerability — .NET 6.0 7.5 High2023-08-08
CVE-2023-3825 PTC Kepware KEPServerEX 缓冲区错误漏洞 — KEPServerEX 7.5 High2023-07-31
CVE-2023-38498 Discourse vulnerable to DoS via defer queue — discourse 4.3 Medium2023-07-28
CVE-2023-37900 Crossplane vulnerable to denial of service from large image — crossplane 3.4 Low2023-07-27
CVE-2023-3637 Openstack-neutron: unrestricted creation of security groups (fix for cve-2022-3277) — Red Hat OpenStack Platform 16.2 4.3 Medium2023-07-25
CVE-2023-38200 Keylime: registrar is subject to a dos against ssl connections — Red Hat Enterprise Linux 9 7.5 High2023-07-24
CVE-2023-3782 DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response 5.9 Medium2023-07-19
CVE-2023-37480 Fides Webserver Vulnerable to Zip Bomb File Uploads — fides 2.7 Low2023-07-18
CVE-2023-37481 Fides Webserver Vulnerable to SVG Bomb File Uploads — fides 2.7 Low2023-07-18
CVE-2023-2263 Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A – CIP Message Attack Could Cause Denial-Of-Service — Kinetix 5700 DC Bus Power Supply Series A 7.5 High2023-07-18
CVE-2023-37475 Attacker-controlled parameter can cause denial of service in hamba avro — avro 7.5 High2023-07-17
CVE-2023-3593 Server crash via a specially crafted markdown input — Mattermost 4.3 Medium2023-07-17
CVE-2023-3614 Denial of Service via specially crafted gif image — Mattermost 4.3 Medium2023-07-17
CVE-2023-3585 channel DoS by sharing a boards link — Mattermost 4.3 Medium2023-07-17
CVE-2022-4952 OmniSharp csharp-language-server-protocol JSON Serializer SerializerBase.cs CreateSerializerSettings resource consumption — csharp-language-server-protocol 3.5 Low2023-07-17
CVE-2023-36818 Denial of service via User Custom Sidebar Section Unlimited Link Creation in discourse — discourse 6.5 Medium2023-07-14
CVE-2023-35945 Envoy vulnerable to HTTP/2 memory leak in nghttp2 codec — envoy 7.5 High2023-07-13
CVE-2023-37463 Quadratic complexity bugs may lead to a denial of service — cmark-gfm 6.4 Medium2023-07-13
CVE-2023-34458 mx-chain-go's relayed transactions always increment nonce — mx-chain-go 7.1 High2023-07-13

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.