Insufficient Resource Pool |
| Weakness ID: 410 (Weakness Base) | Status: Incomplete |
Description Summary
Extended Description
Frequently the consequence is a "flood" of connection or sessions.
| Scope | Effect |
|---|---|
Availability Integrity | Floods often cause a crash or other problem besides denial of the resource itself; these are likely examples of *other* vulnerabilities, not an insufficient resource pool. |
Example 1
In the following snippet from a Tomcat configuration file, a JDBC connection pool is defined with a maximum of 5 simultaneous connections (with a 60 second timeout). In this case, it may be trivial for an attacker to instigate a denial of service (DoS) by using up all of the available connections in the pool.
| Reference | Description |
|---|---|
| CVE-1999-1363 | Large number of locks on file exhausts the pool and causes crash. |
| CVE-2001-1340 | Product supports only one connection and does not disconnect a user who does not provide credentials. |
| CVE-2002-0406 | Large number of connections without providing credentials allows connection exhaustion. |
Do not perform resource-intensive transactions for unauthenticated users and/or invalid requests. |
Consider implementing a velocity check mechanism which would detect abusive behavior. |
Consider load balancing as an option to handle heavy loads. |
Make sure that resource handles are properly closed when no longer needed. |
Find the resouce intensive operations in your code and consider protecting them from abuse (e.g. malicious automated script which runs the resources out). |
| "Large" is relative to the size of the resource pool, which could be very small. See examples. |
| Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
|---|---|---|---|---|
| ChildOf | Category | 399 | Resource Management Errors | Development Concepts (primary)699 |
| ChildOf | Weakness Class | 664 | Improper Control of a Resource Through its Lifetime | Research Concepts (primary)1000 |
| ChildOf | Category | 730 | OWASP Top Ten 2004 Category A9 - Denial of Service | Weaknesses in OWASP Top Ten (2004) (primary)711 |
| CanPrecede | Weakness Base | 400 | Uncontrolled Resource Consumption ('Resource Exhaustion') | Development Concepts699 Research Concepts1000 |
| CanAlsoBe | Weakness Base | 412 | Unrestricted Externally Accessible Lock | Research Concepts1000 |
| Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
|---|---|---|---|
| PLOVER | Insufficient Resource Pool | ||
| OWASP Top Ten 2004 | A9 | CWE More Specific | Denial of Service |
| [REF-11] M. Howard and D. LeBlanc. "Writing Secure Code". Chapter 17, "Protecting Against Denial of Service Attacks" Page 517. 2nd Edition. Microsoft. 2002. |
| Submissions | ||||
|---|---|---|---|---|
| Submission Date | Submitter | Organization | Source | |
| PLOVER | Externally Mined | |||
| Modifications | ||||
| Modification Date | Modifier | Organization | Source | |
| 2008-07-01 | Sean Eidemiller | Cigital | External | |
| added/updated demonstrative examples | ||||
| 2008-07-01 | Eric Dalci | Cigital | External | |
| updated Potential Mitigations, Time of Introduction | ||||
| 2008-09-08 | CWE Content Team | MITRE | Internal | |
| updated Common Consequences, Relationships, Other Notes, Taxonomy Mappings | ||||
| 2008-10-14 | CWE Content Team | MITRE | Internal | |
| updated Description, Relationships | ||||
| 2009-07-27 | CWE Content Team | MITRE | Internal | |
| updated Demonstrative Examples | ||||
| 2009-10-29 | CWE Content Team | MITRE | Internal | |
| updated Common Consequences | ||||








