 
                            ...
| Rule | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| MEM31-C | 3 (high) | 2 (probable) | 1 (high) | P6 | L2 | 
Examples of vulnerabilities resulting from the violation of this rule can be found on the CERTwebsite.
References
| Wiki Markup | 
|---|
| VU#623332 \[[http://www.kb.cert.org/vuls/id/623332]] MIT krb5 Security Advisory 2005-003 \[[http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-003-recvauth.txt]] OWASP, Double Free \[[VU#623332|AA. C References#VU623332]\] \[[MIT 05|AA. C References#MIT 05]\] OWASP, [Double Free|http://www.owasp.org/index.php/Double_Free]] \[[Viega 05|AA. C References#Viega 05]\] "Doubly freeing memory" |