Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-416 (释放后使用) — Vulnerability Class 2495

2495 vulnerabilities classified as CWE-416 (释放后使用). AI Chinese analysis included.

CWE-416, Use After Free, is a critical memory safety weakness occurring when a program continues to reference a memory location after it has been deallocated. Attackers typically exploit this vulnerability by freeing an object and then rapidly reallocating that same memory block with attacker-controlled data. Because the original pointer still points to the now-invalid address, the application may inadvertently execute malicious code or corrupt memory structures, often leading to arbitrary code execution or denial of service. To prevent this, developers must rigorously manage memory lifecycles by nullifying pointers immediately after freeing them, ensuring no dangling references remain. Utilizing modern programming languages with automatic garbage collection or employing static analysis tools to detect invalid memory accesses further mitigates the risk, ensuring that freed memory is never accessed again during the program’s execution.

MITRE CWE Description
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Common Consequences (4)
IntegrityModify Memory
The use of previously freed memory may corrupt valid data, if the memory area in question has been allocated and used properly elsewhere.
AvailabilityDoS: Crash, Exit, or Restart
If chunk consolidation occurs after the use of previously freed data, the process may crash when invalid data is used as chunk information.
ConfidentialityRead Memory
Read operations on freed memory can sometimes leak sensitive information instead of causing a crash
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If malicious data is entered before chunk consolidation can take place, it may be possible to take advantage of a write-what-where primitive to execute arbitrary code. If the newly allocated data happens to hold a class, in C++ for example, various function pointers may be scattered within the heap …
Mitigations (2)
Architecture and DesignChoose a language that provides automatic memory management.
ImplementationWhen freeing pointers, be sure to set them to NULL once they are freed. However, the utilization of multiple or complex data structures may lower the usefulness of this strategy.
Effectiveness: Defense in Depth
Examples (2)
The following example demonstrates the weakness.
#include <stdio.h> #include <unistd.h> #define BUFSIZER1 512 #define BUFSIZER2 ((BUFSIZER1/2) - 8) int main(int argc, char **argv) { char *buf1R1; char *buf2R1; char *buf2R2; char *buf3R2; buf1R1 = (char *) malloc(BUFSIZER1); buf2R1 = (char *) malloc(BUFSIZER1); free(buf2R1); buf2R2 = (char *) malloc(BUFSIZER2); buf3R2 = (char *) malloc(BUFSIZER2); strncpy(buf2R1, argv[1], BUFSIZER1-1); free(buf1R1); free(buf2R2); free(buf3R2); }
Bad · C
The following code illustrates a use after free error:
char* ptr = (char*)malloc (SIZE); if (err) { abrt = 1; free(ptr); } ... if (abrt) { logError("operation aborted before commit", ptr); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2024-43102 umtx Kernel panic or Use-After-Free — FreeBSD 7.8 -2024-09-05
CVE-2024-45063 Multiple issues in ctl(4) CAM Target Layer — FreeBSD 9.9 -2024-09-05
CVE-2024-8362 Google Chrome 安全漏洞 — Chrome 8.8AIHighAI2024-09-03
CVE-2024-3655 Mali GPU Kernel Driver allows improper GPU memory processing operations — Bifrost GPU Kernel Driver 7.8AIHighAI2024-09-03
CVE-2024-38402 Use After Free in DSP Services — Snapdragon 7.8 High2024-09-02
CVE-2024-38401 Use After Free in Qualcomm IPC — Snapdragon 7.8 High2024-09-02
CVE-2024-33060 Use After Free in DSP Service — Snapdragon 8.4 High2024-09-02
CVE-2024-23365 Use After Free in SCE-Mink — Snapdragon 8.4 High2024-09-02
CVE-2024-41160 Liteos-A has an use after free vulnerability — OpenHarmony 8.8 High2024-09-02
CVE-2024-41157 Liteos-A has an use after free vulnerability — OpenHarmony 8.8 High2024-09-02
CVE-2024-7968 Google Chrome 安全漏洞 — Chrome 8.8AIHighAI2024-08-21
CVE-2024-7964 Google Chrome 安全漏洞 — Chrome 8.8AIHighAI2024-08-21
CVE-2024-7725 Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability — PDF Reader 7.8AIHighAI2024-08-21
CVE-2024-7724 Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability — PDF Reader 7.8AIHighAI2024-08-21
CVE-2024-7723 Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability — PDF Reader 7.8AIHighAI2024-08-21
CVE-2024-7722 Foxit PDF Reader Doc Object Use-After-Free Information Disclosure Vulnerability — PDF Reader 5.5AIMediumAI2024-08-21
CVE-2024-43472 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability — Microsoft Edge (Chromium-based) 5.8 Medium2024-08-16
CVE-2024-43374 Vim heap-use-after-free in src/arglist.c:207 — vim 4.5 Medium2024-08-15
CVE-2024-39422 ZDI-CAN-24090: New Vulnerability Report - Use-after-free remote code execution vulnerability in Adobe Acrobat Reader DC — Acrobat Reader 7.8 High2024-08-14
CVE-2024-41831 ZDI-CAN-24569: Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability — Acrobat Reader 7.8 High2024-08-14
CVE-2024-39424 ZDI-CAN-24309: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability — Acrobat Reader 7.8 High2024-08-14
CVE-2024-41830 Talos Security Advisory for Adobe (TALOS-2024-2009) — Acrobat Reader 7.8 High2024-08-14
CVE-2024-39383 PoC sample of unknown vulnerability detected by EXPMON system — Acrobat Reader 7.8 High2024-08-14
CVE-2024-39388 ZDI-CAN-24055: Adobe Substance 3D Stager SKP File Parsing Use-After-Free Remote Code Execution Vulnerability — Substance3D - Stager 7.8 High2024-08-14
CVE-2024-34117 Adobe Photoshop 2024 MPO File Parsing Use-After-Free vulnerability — Photoshop Desktop 7.8 High2024-08-14
CVE-2024-20789 ZDI-CAN-24030: Adobe Dimension SKP File Parsing Use-After-Free Remote Code Execution Vulnerability — Dimension 7.8 High2024-08-14
CVE-2024-38171 Microsoft PowerPoint Remote Code Execution Vulnerability — Microsoft Office 2019 7.8 High2024-08-13
CVE-2024-38158 Azure IoT SDK Remote Code Execution Vulnerability — C SDK for Azure IoT 7.0 High2024-08-13
CVE-2024-38150 Windows DWM Core Library Elevation of Privilege Vulnerability — Windows Server 2022 7.8 High2024-08-13
CVE-2024-38147 Microsoft DWM Core Library Elevation of Privilege Vulnerability — Windows Server 2022 7.8 High2024-08-13

Vulnerabilities classified as CWE-416 (释放后使用) represent 2495 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.