...
Memory leaks in Java applications may be exploited in a DoS attack.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MSC04-J | Low | Unlikely | High | P1 | L3 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Parasoft Jtest |
| BD.RES.LEAKS | Implemented |
Related Guidelines
Memory Leak [XYL] | |
CWE-401, Improper Release of Memory before Removing Last Reference ("Memory Leak") |
Bibliography
[API 2014] | |
Item 6, "Eliminate Obsolete Object References" | |
"Memory Leak Avoidance" | |
"Lapsed Listeners" | |
"Memory Leaks with Global Maps" | |
...