This vulnerability occurs when software loses track of a resource it has allocated, like memory or a file handle, preventing the system from properly releasing it back for future use.
This issue, often called a resource leak, happens when a program allocates a resource but then loses all pointers or handles to it. Without an active reference, the developer's code can no longer access or free the resource, yet the system still considers it in use. This slowly drains available system resources, which can lead to performance degradation or crashes. In environments with automatic garbage collection, this problem is less common for memory because the system can reclaim memory once all references are gone. However, garbage collectors often don't manage other resources like database connections, open files, or network sockets, so explicit cleanup is still required for those, making this a relevant concern in most programming contexts.
Impact: DoS: Resource Consumption (Other)
An attacker that can influence the allocation of resources that are not properly maintained could deplete the available resource pool and prevent all other processes from accessing the same type of resource.
Strategy: Resource Limitation
Medium