...
Memory leaks in Java applications may be exploited in a DoS attack.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
MSC04-J | Low | Unlikely | No | NoHigh | P1 | L3 |
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Parasoft Jtest |
| CERT.MSC04.LEAKS | Ensure resources are deallocated |
Related Guidelines
| ISO/IEC TR 24772:2010 | Memory Leak [XYL] |
CWE-401, Improper Release of Memory before Removing Last Reference ("Memory Leak") |
Bibliography
[API 2014] | |
Item 6, "Eliminate Obsolete Object References" | |
"Memory Leak Avoidance" | |
"Lapsed Listeners" | |
...