Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Edited by sciSpider (sch jbop) (X_X)@==(Q_Q)@

...

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

FIO42-C

2 (medium)

1 (unlikely)

2 (medium)

P4

L3

Related Vulnerabilities

Search for Examples of vulnerabilities resulting from the violation of this recommendation can be found rule on the CERT website.

References

Wiki Markup
\[[Dowd 06|AA. C References#Dowd 06]\] Chapter 10, "UNIX Processes" (File Descriptor Leaks 582-587)
\[[MITRE 07|AA. C References#MITRE 07]\] [CWE ID 403|http://cwe.mitre.org/data/definitions/403.html], "UNIX file descriptor leaks"
\[[MSDN|AA. C References#MSDN 07]\] Inheritance (Windows)
\[[NAI 98|AA. C References#NAI 98]\] Bugtraq: Network Associates Inc. Advisory (OpenBSD)