...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
FIO42-C | 2 (medium) | 1 (unlikely) | 2 (medium) | P4 | L3 |
Examples of vulnerabilities resulting from the violation of this recommendation can be found on the CERT website.
References
| Wiki Markup |
|---|
\[[Dowd 06|AA. C References#Dowd 06]\] Chapter 10, "UNIX Processes" (File Descriptor Leaks 582-587) \[[MITRE 07|AA. C References#MITRE 07]\] UNIX file descriptor leaks \[[MSDN|AA. C References#MSDN 07]\] Inheritance (Windows) \[[Openbsd 98|http://seclists.org/bugtraq/1998/Aug/0071.html]\] |