Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-416 (释放后使用) — Vulnerability Class 2435

2435 vulnerabilities classified as CWE-416 (释放后使用). AI Chinese analysis included.

CWE-416, Use After Free, is a critical memory safety weakness occurring when a program continues to reference a memory location after it has been deallocated. Attackers typically exploit this vulnerability by freeing an object and then rapidly reallocating that same memory block with attacker-controlled data. Because the original pointer still points to the now-invalid address, the application may inadvertently execute malicious code or corrupt memory structures, often leading to arbitrary code execution or denial of service. To prevent this, developers must rigorously manage memory lifecycles by nullifying pointers immediately after freeing them, ensuring no dangling references remain. Utilizing modern programming languages with automatic garbage collection or employing static analysis tools to detect invalid memory accesses further mitigates the risk, ensuring that freed memory is never accessed again during the program’s execution.

MITRE CWE Description
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Common Consequences (4)
IntegrityModify Memory
The use of previously freed memory may corrupt valid data, if the memory area in question has been allocated and used properly elsewhere.
AvailabilityDoS: Crash, Exit, or Restart
If chunk consolidation occurs after the use of previously freed data, the process may crash when invalid data is used as chunk information.
ConfidentialityRead Memory
Read operations on freed memory can sometimes leak sensitive information instead of causing a crash
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If malicious data is entered before chunk consolidation can take place, it may be possible to take advantage of a write-what-where primitive to execute arbitrary code. If the newly allocated data happens to hold a class, in C++ for example, various function pointers may be scattered within the heap …
Mitigations (2)
Architecture and DesignChoose a language that provides automatic memory management.
ImplementationWhen freeing pointers, be sure to set them to NULL once they are freed. However, the utilization of multiple or complex data structures may lower the usefulness of this strategy.
Effectiveness: Defense in Depth
Examples (2)
The following example demonstrates the weakness.
#include <stdio.h> #include <unistd.h> #define BUFSIZER1 512 #define BUFSIZER2 ((BUFSIZER1/2) - 8) int main(int argc, char **argv) { char *buf1R1; char *buf2R1; char *buf2R2; char *buf3R2; buf1R1 = (char *) malloc(BUFSIZER1); buf2R1 = (char *) malloc(BUFSIZER1); free(buf2R1); buf2R2 = (char *) malloc(BUFSIZER2); buf3R2 = (char *) malloc(BUFSIZER2); strncpy(buf2R1, argv[1], BUFSIZER1-1); free(buf1R1); free(buf2R2); free(buf3R2); }
Bad · C
The following code illustrates a use after free error:
char* ptr = (char*)malloc (SIZE); if (err) { abrt = 1; free(ptr); } ... if (abrt) { logError("operation aborted before commit", ptr); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2026-32089 Windows Speech Brokered Api Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.8 High2026-04-14
CVE-2026-32075 Windows UPnP Device Host Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.0 High2026-04-14
CVE-2026-32073 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.0 High2026-04-14
CVE-2026-27924 Desktop Window Manager Elevation of Privilege Vulnerability — Windows 10 Version 21H2 7.8 High2026-04-14
CVE-2026-27917 Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.0 High2026-04-14
CVE-2026-27915 Windows UPnP Device Host Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.8 High2026-04-14
CVE-2026-27908 Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability — Windows 10 Version 1607 7.0 High2026-04-14
CVE-2026-26181 Microsoft Brokering File System Elevation of Privilege Vulnerability — Windows 11 version 22H3 7.8 High2026-04-14
CVE-2026-26165 Windows Shell Elevation of Privilege Vulnerability — Windows 11 version 22H3 7.0 High2026-04-14
CVE-2026-27283 InDesign Desktop | Use After Free (CWE-416) — InDesign Desktop 7.8 High2026-04-14
CVE-2026-40311 ImageMagick: Heap-use-after-free via XMP profile could result in a crash when printing values — ImageMagick 5.5 Medium2026-04-13
CVE-2026-6100 Use-after-free in lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use under memory pressure — CPython 8.4 -2026-04-13
CVE-2026-34859 Huawei EMUI和Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.9 Medium2026-04-13
CVE-2026-34854 Huawei EMUI和Huawei HarmonyOS 安全漏洞 — HarmonyOS 5.7 Medium2026-04-13
CVE-2026-5460 Heap Use-After-Free in PQC Hybrid KeyShare Error Cleanup in wolfSSL TLS 1.3 — wolfSSL 9.1 -2026-04-09
CVE-2026-34734 HDF5: H5T__conv_struct Use After Free — hdf5 7.8 High2026-04-09
CVE-2026-34983 Wasmtime has a use-after-free bug after cloning `wasmtime::Linker` — wasmtime 7.5AIHighAI2026-04-09
CVE-2026-34757 LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure — libpng 5.1 Medium2026-04-09
CVE-2026-5904 Google Chrome 资源管理错误漏洞 — Chrome 8.8AIHighAI2026-04-08
CVE-2026-5883 Google Chrome 资源管理错误漏洞 — Chrome 8.8AIHighAI2026-04-08
CVE-2026-5877 Google Chrome 资源管理错误漏洞 — Chrome 8.8AIHighAI2026-04-08
CVE-2026-5874 Google Chrome 资源管理错误漏洞 — Chrome 9.6AICriticalAI2026-04-08
CVE-2026-5872 Google Chrome 资源管理错误漏洞 — Chrome 8.8AIHighAI2026-04-08
CVE-2026-5866 Google Chrome 资源管理错误漏洞 — Chrome 8.8AIHighAI2026-04-08
CVE-2026-5861 Google Chrome 资源管理错误漏洞 — Chrome 8.8AIHighAI2026-04-08
CVE-2026-5860 Google Chrome 资源管理错误漏洞 — Chrome 8.8AIHighAI2026-04-08
CVE-2026-28387 Potential Use-after-free in DANE Client Code — OpenSSL 9.8AICriticalAI2026-04-07
CVE-2026-39316 CUPS has a use-after-free in `cupsdDeleteTemporaryPrinters` via dangling subscription pointer — cups 4.0 Medium2026-04-07
CVE-2026-35554 Apache Kafka Clients: Kafka Producer Message Corruption and Misrouting via Buffer Pool Race Condition — Apache Kafka Clients 7.4AIHighAI2026-04-07
CVE-2026-34764 Electron has a use-after-free in offscreen shared texture release() callback — electron 2.3 Low2026-04-06

Vulnerabilities classified as CWE-416 (释放后使用) represent 2435 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.