 
                            ...
| Code Block | ||
|---|---|---|
| 
 | ||
| // ...
  private Map<SSLSocket, InetAddress> m = Collections.synchronizedMap(
      new WeakHashMap<SSLSocket, InetAddress>());
// ... | 
...
Memory leaks in Java applications may be exploited in a DoS attack.
| Rule | Severity | Likelihood | Detectable | Remediation CostRepairable | Priority | Level | 
|---|---|---|---|---|---|---|
| MSC04-J | Low | Unlikely | No | NoHigh | P1 | L3 | 
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Parasoft Jtest | 
 | CERT.MSC04.LEAKS | Ensure resources are deallocated | 
Related Guidelines
| ISO/IEC TR 24772:2010 | Memory Leak [XYL] | 
| CWE-401, Improper Release of Memory before Removing Last Reference ("Memory Leak") | 
Bibliography
| [API 2014] | |||
| Item 6, "Eliminate Obsolete Object References" | |||
| "Memory Leak Avoidance" | |||
| "Lapsed Listeners" | "Memory Leaks with Global Maps" | ||
...