Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: spurious mc macro

...

Memory leaks in Java applications may be exploited in a DoS attack.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

MSC04-J

Low

Unlikely

High

P1

L3

Automated Detection

ToolVersionCheckerDescription
Parasoft Jtest
Include Page
Parasoft_V
Parasoft_V
BD.RES.LEAKSImplemented

Related Guidelines

ISO/IEC TR 24772:2010

Memory Leak [XYL]

MITRE CWE

CWE-401, Improper Release of Memory before Removing Last Reference ("Memory Leak")

Bibliography

[API 2014]

Class Vector
Class WeakReference

[Bloch 2008]

Item 6, "Eliminate Obsolete Object References"

[Commes 2007]

"Memory Leak Avoidance"

[Goetz 2005a]

"Lapsed Listeners"

[Goetz 2005b]

"Memory Leaks with Global Maps"
"Reference Queues"

[Gupta 2005]

 

 



...