结构: Simple
Abstraction: Class
状态: Incomplete
被利用可能性: unkown
Software that does not appropriately monitor or control resource consumption can lead to adverse system performance.
This situation is amplified if the software allows malicious users or attackers to consume more resources than their access level permits. Exploiting such a weakness can lead to asymmetric resource consumption, aiding in amplification attacks against the system or the network.
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
Availability | ['DoS: Amplification', 'DoS: Resource Consumption (Other)'] | Sometimes this is a factor in "flood" attacks, but other types of amplification exist. |
策略:
An application must make resources available to a client commensurate with the client's access level.
策略:
An application must, at all times, keep track of allocated resources and meter their usage appropriately.
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Asymmetric resource consumption (amplification) | ||
OWASP Top Ten 2004 | A9 | CWE More Specific | Denial of Service |
WASC | 41 | XML Attribute Blowup | |
The CERT Oracle Secure Coding Standard for Java (2011) | TPS00-J | Use thread pools to enable graceful degradation of service during traffic bursts | |
The CERT Oracle Secure Coding Standard for Java (2011) | FIO04-J | Release resources when they are no longer needed |