目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-400 未加控制的资源消耗(资源穷尽) 类漏洞列表 1397

CWE-400 未加控制的资源消耗(资源穷尽) 类弱点 1397 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-400 指资源消耗不受控漏洞,属于资源管理缺陷。攻击者通常通过发送大量请求或构造复杂查询,耗尽服务器 CPU、内存或带宽,导致服务拒绝。开发者应避免此类问题,需实施严格的速率限制、请求大小校验及资源配额管理,并设置合理的超时机制与异常处理逻辑,确保有限资源在预期范围内被安全分配与维护。

MITRE CWE 官方描述
CWE:CWE-400 不受控的资源消耗 (Uncontrolled Resource Consumption) 英文:该产品未正确控制有限资源的分配和维护。
常见影响 (2)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other)
If an attacker can trigger the allocation of the limited resources, but the number or size of the resources is not controlled, then the most common result is denial of service. This would prevent valid users from accessing the product, and it could potentially have an impact on the surrounding envir…
Access Control, OtherBypass Protection Mechanism, Other
In some cases it may be possible to force the product to "fail open" in the event of resource exhaustion. The state of the product -- and possibly the security functionality - may then be compromised.
缓解措施 (4)
Architecture and DesignDesign throttling mechanisms into the system architecture. The best protection is to limit the amount of resources that an unauthorized user can cause to be expended. A strong authentication and access control model will help prevent such attacks from occurring in the first place. The login application should be protected against DoS attacks as much as possible. Limiting the database access, perha…
Architecture and DesignMitigation of resource exhaustion attacks requires that the target system either: recognizes the attack and denies that user further access for a given amount of time, or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed. The first of these solutions is an issue in itself though, since it may allow attackers to preven…
Architecture and DesignEnsure that protocols have specific limits of scale placed on them.
ImplementationEnsure that all failures in resource allocation place the system into a safe posture.
代码示例 (2)
The following example demonstrates the weakness.
class Worker implements Executor { ... public void execute(Runnable r) { try { ... } catch (InterruptedException ie) { // postpone response Thread.currentThread().interrupt(); } } public Worker(Channel ch, int nworkers) { ... } protected void activate() { Runnable loop = new Runnable() { public void run() { try { for (;;) { Runnable r = ...; r.run(); } } catch (InterruptedException ie) { ... } } }; new Thread(loop).start(); } }
Bad · Java
This code allocates a socket and forks each time it receives a new connection.
sock=socket(AF_INET, SOCK_STREAM, 0); while (1) { newsock=accept(sock, ...); printf("A connection has been accepted\n"); pid = fork(); }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2018-5391 Linux kernel 输入验证错误漏洞 — Kernel 7.5 -2018-09-06
CVE-2018-6554 Linux kernel 安全漏洞 — Linux Kernel 5.5 -2018-09-04
CVE-2018-10924 Red Hat glusterfs客户端安全漏洞 — glusterfs 5.5 -2018-09-04
CVE-2018-0410 Cisco Web Security Appliances AsyncOS Software 安全漏洞 — AsyncOS Software for Cisco Web Security Appliances 8.6 -2018-08-15
CVE-2018-0418 Cisco ASR 9000 Series Aggregation Services Router Software 输入验证错误漏洞 — ASR 9000 Series Aggregation Services Router Software 8.6 -2018-08-15
CVE-2018-10864 Redha redhat-certification 安全漏洞 — redhat-certification: 6.2 -2018-08-13
CVE-2018-6922 FreeBSD 安全漏洞 — FreeBSD 5.3 -2018-08-09
CVE-2018-5390 Linux kernel 输入验证错误漏洞 — Linux Kernel 7.5 -2018-08-06
CVE-2016-8611 OpenStack Glance 输入验证错误漏洞 — openstack-glance 6.5 -2018-07-31
CVE-2018-10607 Martem GW6和GWM 安全漏洞 — TELEM GW6 7.5 -2018-07-31
CVE-2017-15119 QEMU 安全漏洞 — qemu 7.5 -2018-07-27
CVE-2018-10632 Moxa NPort 5210、5230和5232 安全漏洞 — NPort 5210, 5230, and 5232 7.5 -2018-07-24
CVE-2018-10608 SEL AcSELerator Architect 安全漏洞 — AcSELerator Architect 6.5 -2018-07-24
CVE-2018-0372 Cisco Nexus 9000 Series Fabric Switches 安全漏洞 — Cisco Nexus 9000 Series unknown 7.5 -2018-07-18
CVE-2018-3767 memjs 安全漏洞 — memjs 9.1 -2018-07-05
CVE-2018-0309 Cisco Nexus 3000和9000 Series Switches NX-OS 安全漏洞 — Cisco Nexus 3000 and 9000 unknown 7.7 -2018-06-21
CVE-2017-16086 ua-parser 安全漏洞 — ua-parser node module 7.5 -2018-06-07
CVE-2017-16098 charset 安全漏洞 — charset node module 7.5 -2018-06-07
CVE-2017-16099 no-case模块安全漏洞 — no-case node module 7.5 -2018-06-07
CVE-2017-16111 content模块安全漏洞 — content node module 7.5 -2018-06-07
CVE-2017-16113 parsejson模块安全漏洞 — parsejson node module 7.5 -2018-06-07
CVE-2017-16114 marked模块安全漏洞 — marked node module 7.5 -2018-06-07
CVE-2017-16115 timespan模块安全漏洞 — timespan node module 7.5 -2018-06-07
CVE-2017-16116 string模块安全漏洞 — string node module 7.5 -2018-06-07
CVE-2017-16117 slug 安全漏洞 — slug node module 7.5 -2018-06-07
CVE-2017-16118 forwarded模块安全漏洞 — forwarded node module 7.5 -2018-06-07
CVE-2017-16119 Fresh 安全漏洞 — fresh node module 7.5 -2018-06-07
CVE-2017-16136 method-override 安全漏洞 — method-override node module 7.5 -2018-06-07
CVE-2017-16137 debug模块安全漏洞 — debug node module 7.5 -2018-06-07
CVE-2017-16138 mime模块安全漏洞 — mime node module 7.5 -2018-06-07

CWE-400(未加控制的资源消耗(资源穷尽)) 是常见的弱点类别,本平台收录该类弱点关联的 1397 条 CVE 漏洞。