Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1397

1397 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2022-39374 Synapse Denial of service due to incorrect application of event authorization rules during state resolution — synapse 5.3 -2023-05-26
CVE-2023-20883 Spring Framework 资源管理错误漏洞 — Spring Boot 7.5 -2023-05-26
CVE-2023-20882 Cloud Foundry 安全漏洞 — Cloud Foundry Routing release 5.9 -2023-05-26
CVE-2023-1981 Avahi 资源管理错误漏洞 — avahi 6.5 -2023-05-26
CVE-2023-28320 libcurl 资源管理错误漏洞 — https://github.com/curl/curl 5.9 -2023-05-26
CVE-2023-32067 0-byte UDP payload DoS in c-ares — c-ares 7.5 High2023-05-25
CVE-2023-2798 Denial of service in HtmlUnit 7.5 High2023-05-25
CVE-2022-36326 Resource Exhaustion Vulnerability in Western Digital devices — My Cloud Home and My Cloud Home Duo 4.4 Medium2023-05-18
CVE-2023-26044 ReactPHP's HTTP server continues parsing unused multipart parts after reaching limits — http 5.3 Medium2023-05-17
CVE-2023-2295 Libreswan 安全漏洞 — libreswan 7.5 -2023-05-17
CVE-2023-31409 SICK FTMg 资源管理错误漏洞 — SICK FTMG-ESD15AXX AIR FLOW SENSOR 5.3 Medium2023-05-15
CVE-2023-23447 SICK FTMg 资源管理错误漏洞 — SICK FTMG-ESD15AXX AIR FLOW SENSOR 7.5 High2023-05-15
CVE-2023-28356 Rocket.Chat 资源管理错误漏洞 — Rocket.Chat 7.5 -2023-05-11
CVE-2022-36329 Denial of Service over OTA mechanism in Western Digital My Cloud Home and ibi devices — My Cloud Home and My Cloud Home Duo 4.4 Medium2023-05-10
CVE-2023-25568 Boxo bitswap/server: DOS unbounded persistent memory leak — boxo 8.2 High2023-05-10
CVE-2023-24594 BIG-IP TMM SSL vulnerability — BIG-IP 5.3 Medium2023-05-03
CVE-2023-30798 MultipartParser DOS with too many fields or files in Starlette Framework — Starlette 7.5 High2023-04-21
CVE-2023-0384 Uncontrolled Resource Consuption in M-Files Server — M-Files Server 6.5 Medium2023-04-20
CVE-2023-28440 Denial of service via admin theme import route in Discourse — discourse 2.7 Low2023-04-18
CVE-2023-26048 OutOfMemoryError for large multipart without filename in Eclipse Jetty — jetty.project 5.3 Medium2023-04-18
CVE-2023-30769 Rab13s Exploit — Node 9.1 Critical2023-04-17
CVE-2023-29013 HTTP header parsing could cause a deny of service — traefik 7.5 High2023-04-14
CVE-2023-20863 Spring Framework 安全漏洞 — Spring Framework 6.5 -2023-04-13
CVE-2023-24545 On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. — EOS 7.5 High2023-04-12
CVE-2023-28217 Windows Network Address Translation (NAT) Denial of Service Vulnerability — Windows 10 Version 1809 7.5 High2023-04-11
CVE-2023-29185 Denial of Service (DOS) in SAP NetWeaver AS for ABAP (Business Server Pages) — NetWeaver AS for ABAP (Business Server Pages) 5.3 Medium2023-04-11
CVE-2023-28763 Denial of Service in SAP NetWeaver AS for ABAP and ABAP Platform — NetWeaver AS for ABAP and ABAP Platform 6.5 Medium2023-04-11
CVE-2023-20051 Cisco Packet Data Network Gateway IPsec ICMP Denial of Service Vulnerability — Cisco ASR 5000 Series Software 5.8 Medium2023-04-05
CVE-2023-28837 Wagtail vulnerable to denial-of-service via memory exhaustion when uploading large files — wagtail 4.9 Medium2023-04-03
CVE-2023-24824 Quadratic complexity may lead to a denial of service in cmark-gfm — cmark-gfm 5.3 Medium2023-03-31

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1397 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.