Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-400 (未加控制的资源消耗(资源穷尽)) — Vulnerability Class 1420

1420 vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)). AI Chinese analysis included.

CWE-400 represents a critical resource management weakness where software fails to properly control the allocation and maintenance of finite system resources, such as memory, CPU cycles, or file descriptors. Attackers typically exploit this vulnerability by triggering actions that consume excessive resources, leading to denial-of-service conditions that degrade performance or crash the application entirely. This often occurs through crafted inputs that force infinite loops, excessive data processing, or unbounded memory allocation. To mitigate this risk, developers must implement strict resource limits, including timeouts, maximum iteration counts, and memory caps. Additionally, employing robust input validation and monitoring tools helps detect abnormal consumption patterns early. By enforcing these controls, engineers ensure that applications remain resilient against resource exhaustion attacks, maintaining availability and stability even under malicious stress or unexpected load spikes.

MITRE CWE Description
The product does not properly control the allocation and maintenance of a limited resource.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
Mitigations (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
Examples (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2021-32640 ReDoS in Sec-Websocket-Protocol header — ws 5.3 Medium2021-05-25
CVE-2021-32455 SITEL CAP/PRX vulnerable to a denial of service attack — CAP/PRX 6.8 Medium2021-05-17
CVE-2021-32617 Denial of service in Exiv2 — exiv2 4.7 Medium2021-05-17
CVE-2021-32816 Regular expression Denial of Service in ProtonMail — WebClient 6.5 Medium2021-05-14
CVE-2021-29506 Navigate endpoint is vulnerable to regex injection that may lead to Denial of Service. — graphhopper 6.5 Medium2021-05-13
CVE-2021-22139 Elastic Stack Kibana 资源管理错误漏洞 — Kibana 6.5 -2021-05-13
CVE-2021-27385 Siemens SmartVNC 资源管理错误漏洞 — SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) 7.5 -2021-05-12
CVE-2020-25242 多款 Siemens 设备资源管理错误漏洞 — SIMATIC NET CP 343-1 Advanced (incl. SIPLUS variants) 7.5 -2021-05-12
CVE-2021-29509 Keepalive Connections Causing Denial Of Service in puma — puma 7.5 High2021-05-11
CVE-2021-29471 Denial of service in Matrix Synapse — synapse 3.7 Low2021-05-11
CVE-2021-21419 Improper Handling of Highly Compressed Data (Data Amplification) and Memory Allocation with Excessive Size Value in eventlet — eventlet 5.3 Medium2021-05-07
CVE-2021-31409 Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 — Vaadin 7.5 High2021-05-05
CVE-2021-1489 Cisco Firepower Device Manager Software Filesystem Space Exhaustion Denial of Service Vulnerability — Cisco Firepower Threat Defense Software 6.5 -2021-04-29
CVE-2021-21391 Regular expression Denial of Service in multiple packages — ckeditor5 6.5 Medium2021-04-29
CVE-2021-29469 Potential exponential regex in monitor mode — node-redis 5.3 Medium2021-04-23
CVE-2020-36320 Regular expression Denial of Service (ReDoS) in EmailValidator class in Vaadin 7 — Vaadin 7.5 High2021-04-23
CVE-2021-31405 Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17 — Vaadin 7.5 High2021-04-23
CVE-2021-0257 Junos OS: MX Series, EX9200 Series: Trio-based MPCs memory leak in VPLS with integrated routing and bridging (IRB) interface — Junos OS 6.5 Medium2021-04-22
CVE-2021-0238 Junos OS: MX Series: Executing CLI command repetitively may cause the system to run out of disk space — Junos OS 5.5 Medium2021-04-22
CVE-2021-0229 Junos OS: Receipt of specific packets could lead to Denial of Service in MQTT Server — Junos OS 5.3 Medium2021-04-22
CVE-2021-0230 Junos OS: SRX Series: Memory leak when querying Aggregated Ethernet (AE) interface statistics — Junos OS 7.5 High2021-04-22
CVE-2021-29453 Denial of service through memory exhaustion — matrix-media-repo 5.7 Medium2021-04-19
CVE-2021-21529 Dell System Update 资源管理错误漏洞 — DellEMC System Update - DSU 3.8 Low2021-04-02
CVE-2021-28165 Eclipse Jetty 资源管理错误漏洞 — Eclipse Jetty 7.5 High2021-04-01
CVE-2021-20234 ZeroMQ 资源管理错误漏洞 — zeromq 7.5 -2021-04-01
CVE-2021-3478 LIM OpenEXR 资源管理错误漏洞 — OpenEXR 6.2 -2021-03-31
CVE-2021-3479 LIM OpenEXR 资源管理错误漏洞 — OpenEXR 6.2 -2021-03-31
CVE-2018-1107 Npm is-my-json-valid 资源管理错误漏洞 — nodejs-is-my-json-valid 5.3 -2021-03-30
CVE-2021-20216 Privoxy 资源管理错误漏洞 — privoxy 7.5 -2021-03-25
CVE-2021-1460 Cisco IOx Application Framework Denial of Service Vulnerability — Cisco IOS 5.3 Medium2021-03-24

Vulnerabilities classified as CWE-400 (未加控制的资源消耗(资源穷尽)) represent 1420 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.