Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-416 (释放后使用) — Vulnerability Class 2492

2492 vulnerabilities classified as CWE-416 (释放后使用). AI Chinese analysis included.

CWE-416, Use After Free, is a critical memory safety weakness occurring when a program continues to reference a memory location after it has been deallocated. Attackers typically exploit this vulnerability by freeing an object and then rapidly reallocating that same memory block with attacker-controlled data. Because the original pointer still points to the now-invalid address, the application may inadvertently execute malicious code or corrupt memory structures, often leading to arbitrary code execution or denial of service. To prevent this, developers must rigorously manage memory lifecycles by nullifying pointers immediately after freeing them, ensuring no dangling references remain. Utilizing modern programming languages with automatic garbage collection or employing static analysis tools to detect invalid memory accesses further mitigates the risk, ensuring that freed memory is never accessed again during the program’s execution.

MITRE CWE Description
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Common Consequences (4)
IntegrityModify Memory
The use of previously freed memory may corrupt valid data, if the memory area in question has been allocated and used properly elsewhere.
AvailabilityDoS: Crash, Exit, or Restart
If chunk consolidation occurs after the use of previously freed data, the process may crash when invalid data is used as chunk information.
ConfidentialityRead Memory
Read operations on freed memory can sometimes leak sensitive information instead of causing a crash
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
If malicious data is entered before chunk consolidation can take place, it may be possible to take advantage of a write-what-where primitive to execute arbitrary code. If the newly allocated data happens to hold a class, in C++ for example, various function pointers may be scattered within the heap …
Mitigations (2)
Architecture and DesignChoose a language that provides automatic memory management.
ImplementationWhen freeing pointers, be sure to set them to NULL once they are freed. However, the utilization of multiple or complex data structures may lower the usefulness of this strategy.
Effectiveness: Defense in Depth
Examples (2)
The following example demonstrates the weakness.
#include <stdio.h> #include <unistd.h> #define BUFSIZER1 512 #define BUFSIZER2 ((BUFSIZER1/2) - 8) int main(int argc, char **argv) { char *buf1R1; char *buf2R1; char *buf2R2; char *buf3R2; buf1R1 = (char *) malloc(BUFSIZER1); buf2R1 = (char *) malloc(BUFSIZER1); free(buf2R1); buf2R2 = (char *) malloc(BUFSIZER2); buf3R2 = (char *) malloc(BUFSIZER2); strncpy(buf2R1, argv[1], BUFSIZER1-1); free(buf1R1); free(buf2R2); free(buf3R2); }
Bad · C
The following code illustrates a use after free error:
char* ptr = (char*)malloc (SIZE); if (err) { abrt = 1; free(ptr); } ... if (abrt) { logError("operation aborted before commit", ptr); }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2022-28279 Adobe Photoshop Font Parsing Use-After-Free Remote Code Execution Vulnerability — Photoshop 7.8 -2022-05-06
CVE-2022-28271 Adobe Photoshop PDF File Parsing Use-After-Free Remote Code Execution Vulnerability — Photoshop 7.8 -2022-05-06
CVE-2022-1516 Linux kernel 代码问题漏洞 — Kernel 5.5 -2022-05-05
CVE-2021-3750 QEMU 资源管理错误漏洞 — QEMU 8.2 -2022-05-02
CVE-2022-1114 Imagemagick Studio ImageMagick 资源管理错误漏洞 — ImageMagick 7.1 -2022-04-29
CVE-2022-1048 Linux kernel 资源管理错误漏洞 — kernel 7.0 -2022-04-29
CVE-2022-1444 heap-use-after-free in radareorg/radare2 — radareorg/radare2 5.5 -2022-04-23
CVE-2021-42779 OpenSC 资源管理错误漏洞 — opensc 5.3 -2022-04-18
CVE-2022-1280 Linux kernel 资源管理错误漏洞 — kernel 6.3 -2022-04-13
CVE-2022-24070 Apache Subversion mod_dav_svn is vulnerable to memory corruption — Apache Subversion 9.8 -2022-04-12
CVE-2022-1284 heap-use-after-free in radareorg/radare2 — radareorg/radare2 5.5 -2022-04-08
CVE-2022-1212 Use-After-Free in str_escape in mruby/mruby in mruby/mruby — mruby/mruby 8.4 -2022-04-05
CVE-2022-26417 Rockwell Automation Studio 5000 Logix Designer Use After Free — CX-Position 7.8 High2022-04-01
CVE-2022-24791 Use after free in Wasmtime — wasmtime 8.1 High2022-03-31
CVE-2022-1154 Use after free in utf_ptr2char in vim/vim — vim/vim 7.8 -2022-03-30
CVE-2022-1055 Use after Free in tc_new_tfilter allowing for privilege escalation in Linux Kernel — Kernel 7.8 -2022-03-29
CVE-2022-1050 Guest 资源管理错误漏洞 — QEMU 8.8 -2022-03-29
CVE-2022-1106 use after free in mrb_vm_exec in mruby/mruby — mruby/mruby 7.9 -2022-03-27
CVE-2022-1071 User after free in mrb_vm_exec in mruby/mruby — mruby/mruby 8.2 -2022-03-26
CVE-2021-4150 Linux kernel 资源管理错误漏洞 — kernel 5.5 -2022-03-23
CVE-2021-3748 QEMU 资源管理错误漏洞 — QEMU (virtio-net) 7.8 -2022-03-23
CVE-2022-1031 Use After Free in op_is_set_bp in radareorg/radare2 — radareorg/radare2 7.8 -2022-03-22
CVE-2022-1011 Linux kernel 资源管理错误漏洞 — kernel 7.8 -2022-03-18
CVE-2022-0849 Use After Free in r_reg_get_name_idx in radareorg/radare2 — radareorg/radare2 7.1 -2022-03-05
CVE-2021-3715 Linux kernel 资源管理错误漏洞 — kernel 7.8 -2022-03-02
CVE-2021-3738 Samba 资源管理错误漏洞 — samba 8.1 -2022-03-02
CVE-2021-21708 UAF due to php_filter_float() failing — PHP 8.2 High2022-02-27
CVE-2022-0615 Use-after-free vulnerability in ESET products for Linux — Endpoint Antivirus for Linux 5.9 Medium2022-02-25
CVE-2021-3700 usbredirparser 资源管理错误漏洞 — usbredir 6.6 -2022-02-24
CVE-2021-43826 Crash when tunneling TCP over HTTP in Envoy — envoy 7.5 High2022-02-22

Vulnerabilities classified as CWE-416 (释放后使用) represent 2492 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.