This vulnerability occurs when an application creates file descriptors or handles for a user or process without enforcing any limits on the total number that can be opened.
When an application fails to throttle file handle allocation, a single user or process can exhaust the entire system's available file descriptors. This denial-of-service condition prevents other legitimate processes from opening files, sockets, or other resources, effectively crippling system functionality. Developers can prevent this by implementing per-user or per-process quotas, closing handles promptly after use, and monitoring for abnormal consumption patterns. This ensures system resources remain available for all critical operations and aligns with the principle of least privilege.
Impact: DoS: Resource Consumption (Other)
When allocating resources without limits, an attacker could prevent all other processes from accessing the same type of resource.
Strategy: Resource Limitation
Low