...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MEM31-C | 3 (high) | 2 (probable) | 1 (high) | P6 | L2 |
Examples of vulnerabilities resulting from the violation of this rule can be found on the CERTwebsite.
References
Wiki Markup |
---|
VU#623332 \[[http://www.kb.cert.org/vuls/id/623332]] MIT krb5 Security Advisory 2005-003 \[[http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-003-recvauth.txt]] OWASP, Double Free \[[http://www.owasp.org/index.php/Double_Free]] \[[Viega 05|AA. C References#Viega 05]] Doubly freeing memory |