Insufficient Resource Pool |
Weakness ID: 410 (Weakness Base) | Status: Incomplete |
Description Summary
Extended Description
Frequently the consequence is a "flood" of connection or sessions.
Scope | Effect |
---|---|
Availability Integrity | Floods often cause a crash or other problem besides denial of the resource itself; these are likely examples of *other* vulnerabilities, not an insufficient resource pool. |
Example 1
In the following snippet from a Tomcat configuration file, a JDBC connection pool is defined with a maximum of 5 simultaneous connections (with a 60 second timeout). In this case, it may be trivial for an attacker to instigate a denial of service (DoS) by using up all of the available connections in the pool.
Reference | Description |
---|---|
CVE-1999-1363 | Large number of locks on file exhausts the pool and causes crash. |
CVE-2001-1340 | Product supports only one connection and does not disconnect a user who does not provide credentials. |
CVE-2002-0406 | Large number of connections without providing credentials allows connection exhaustion. |
Do not perform resource-intensive transactions for unauthenticated users and/or invalid requests. |
Consider implementing a velocity check mechanism which would detect abusive behavior. |
Consider load balancing as an option to handle heavy loads. |
Make sure that resource handles are properly closed when no longer needed. |
Find the resouce intensive operations in your code and consider protecting them from abuse (e.g. malicious automated script which runs the resources out). |
"Large" is relative to the size of the resource pool, which could be very small. See examples. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 399 | Resource Management Errors | Development Concepts (primary)699 |
ChildOf | ![]() | 664 | Improper Control of a Resource Through its Lifetime | Research Concepts (primary)1000 |
ChildOf | ![]() | 730 | OWASP Top Ten 2004 Category A9 - Denial of Service | Weaknesses in OWASP Top Ten (2004) (primary)711 |
CanPrecede | ![]() | 400 | Uncontrolled Resource Consumption ('Resource Exhaustion') | Development Concepts699 Research Concepts1000 |
CanAlsoBe | ![]() | 412 | Unrestricted Externally Accessible Lock | Research Concepts1000 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Insufficient Resource Pool | ||
OWASP Top Ten 2004 | A9 | CWE More Specific | Denial of Service |
[REF-11] M. Howard and D. LeBlanc. "Writing Secure Code". Chapter 17, "Protecting Against Denial of Service Attacks" Page 517. 2nd Edition. Microsoft. 2002. |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Sean Eidemiller | Cigital | External | |
added/updated demonstrative examples | ||||
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Common Consequences, Relationships, Other Notes, Taxonomy Mappings | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Description, Relationships | ||||
2009-07-27 | CWE Content Team | MITRE | Internal | |
updated Demonstrative Examples | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Common Consequences |