Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-416 (释放后使用) — Vulnerability Class 2435

2435 vulnerabilities classified as CWE-416 (释放后使用). AI Chinese analysis included.

CWE-416, Use After Free, is a critical memory safety weakness occurring when a program continues to reference a memory location after it has been deallocated. Attackers typically exploit this vulnerability by freeing an object and then rapidly reallocating that same memory block with attacker-controlled data. Because the original pointer still points to the now-invalid address, the application may inadvertently execute malicious code or corrupt memory structures, often leading to arbitrary code execution or denial of service. To prevent this, developers must rigorously manage memory lifecycles by nullifying pointers immediately after freeing them, ensuring no dangling references remain. Utilizing modern programming languages with automatic garbage collection or employing static analysis tools to detect invalid memory accesses further mitigates the risk, ensuring that freed memory is never accessed again during the program’s execution.

MITRE CWE Description
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Common Consequences (4)
IntegrityModify Memory
The use of previously freed memory may corrupt valid data, if the memory area in question has been allocated and used properly elsewhere.
AvailabilityDoS: Crash, Exit, or Restart
If chunk consolidation occurs after the use of previously freed data, the process may crash when invalid data is used as chunk information.
ConfidentialityRead Memory
Read operations on freed memory can sometimes leak sensitive information instead of causing a crash
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If malicious data is entered before chunk consolidation can take place, it may be possible to take advantage of a write-what-where primitive to execute arbitrary code. If the newly allocated data happens to hold a class, in C++ for example, various function pointers may be scattered within the heap …
Mitigations (2)
Architecture and DesignChoose a language that provides automatic memory management.
ImplementationWhen freeing pointers, be sure to set them to NULL once they are freed. However, the utilization of multiple or complex data structures may lower the usefulness of this strategy.
Effectiveness: Defense in Depth
Examples (2)
The following example demonstrates the weakness.
#include <stdio.h> #include <unistd.h> #define BUFSIZER1 512 #define BUFSIZER2 ((BUFSIZER1/2) - 8) int main(int argc, char **argv) { char *buf1R1; char *buf2R1; char *buf2R2; char *buf3R2; buf1R1 = (char *) malloc(BUFSIZER1); buf2R1 = (char *) malloc(BUFSIZER1); free(buf2R1); buf2R2 = (char *) malloc(BUFSIZER2); buf3R2 = (char *) malloc(BUFSIZER2); strncpy(buf2R1, argv[1], BUFSIZER1-1); free(buf1R1); free(buf2R2); free(buf3R2); }
Bad · C
The following code illustrates a use after free error:
char* ptr = (char*)malloc (SIZE); if (err) { abrt = 1; free(ptr); } ... if (abrt) { logError("operation aborted before commit", ptr); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-59734 Heap-buffer-overflow write in FFmpeg SANM process_ftch — FFmpeg 7.8AIHighAI2025-10-06
CVE-2025-49844 Redis Lua Use-After-Free may lead to remote code execution — redis 10.0 Critical2025-10-03
CVE-2025-10729 Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG — Qt 9.8AICriticalAI2025-10-03
CVE-2025-11234 Qemu-kvm: vnc websocket handshake use-after-free 7.5 High2025-10-03
CVE-2025-61692 KEYENCE VT STUDIO 资源管理错误漏洞 — VT STUDIO 7.8 High2025-10-02
CVE-2025-10994 Open Babel gamessformat.cpp ReadMolecule use after free — Open Babel 5.3 Medium2025-09-26
CVE-2025-10501 Google Chrome 安全漏洞 — Chrome 8.8AIHighAI2025-09-24
CVE-2025-10500 Google Chrome 安全漏洞 — Chrome 8.8AIHighAI2025-09-24
CVE-2025-47327 Use After Free in Camera — Snapdragon 7.8 High2025-09-24
CVE-2025-47315 Use After Free in Automotive Software platform based on QNX — Snapdragon 7.8 High2025-09-24
CVE-2025-27077 Use After Free in Automotive Software platform based on QNX — Snapdragon 7.8 High2025-09-24
CVE-2025-27037 Use After Free in Camera Driver — Snapdragon 7.8 High2025-09-24
CVE-2025-8410 Use After Free vulnerability in RTI Connext Professional (Security Plugins) allows File Manipulation. — Connext Professional 9.8AICriticalAI2025-09-23
CVE-2025-10824 axboe fio init.c __parse_jobs_ini use after free — fio 5.3 Medium2025-09-23
CVE-2025-25177 GPU DDK - Roll-back of pvr_exp_fence not in finalised state can cause UAF — Graphics DDK 7.8AIHighAI2025-09-22
CVE-2025-59215 Windows Graphics Component Elevation of Privilege Vulnerability — Windows 11 Version 24H2 7.0 High2025-09-18
CVE-2025-7993 Ashlar-Vellum Cobalt LI File Parsing Use-After-Free Remote Code Execution Vulnerability — Cobalt 7.8AIHighAI2025-09-17
CVE-2025-9449 Use After Free vulnerability affecting the PAR file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025 — SOLIDWORKS eDrawings 7.8 High2025-09-17
CVE-2025-10200 Google Chrome 安全漏洞 — Chrome 8.8AIHighAI2025-09-10
CVE-2025-54258 Substance3D - Modeler | Use After Free (CWE-416) — Substance3D - Modeler 7.8 High2025-09-09
CVE-2025-54257 Acrobat Reader | Use After Free (CWE-416) — Acrobat Reader 7.8 High2025-09-09
CVE-2025-54242 Premiere Pro | Use After Free (CWE-416) — Premiere Pro 7.8 High2025-09-09
CVE-2025-54912 Windows BitLocker Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.8 High2025-09-09
CVE-2025-54911 Windows BitLocker Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.3 High2025-09-09
CVE-2025-54112 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.0 High2025-09-09
CVE-2025-54103 Windows Management Service Elevation of Privilege Vulnerability — Windows 10 Version 21H2 7.4 High2025-09-09
CVE-2025-53802 Windows Bluetooth Service Elevation of Privilege Vulnerability — Windows 10 Version 21H2 7.0 High2025-09-09
CVE-2025-54908 Microsoft PowerPoint Remote Code Execution Vulnerability — Microsoft 365 Apps for Enterprise 7.8 High2025-09-09
CVE-2025-54906 Microsoft Office Remote Code Execution Vulnerability — Microsoft 365 Apps for Enterprise 7.8 High2025-09-09
CVE-2025-54904 Microsoft Excel Remote Code Execution Vulnerability — Microsoft 365 Apps for Enterprise 7.8 High2025-09-09

Vulnerabilities classified as CWE-416 (释放后使用) represent 2435 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.