An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached. 1000 699 Weakness ChildOf 405 888 Category ChildOf 907 Architecture and Design Implementation Low to Medium Availability DoS: resource consumption (CPU) DoS: resource consumption (memory) DoS: resource consumption (other) The typical consequence is CPU consumption, but memory consumption and consumption of other resources can also occur. CVE-2003-0244 CPU consumption via inputs that cause many hash table collisions. CVE-2003-0364 CPU consumption via inputs that cause many hash table collisions. CVE-2002-1203 Product performs unnecessary processing before dropping an invalid packet. CVE-2001-1501 CPU and memory consumption using many wildcards. CVE-2004-2527 Product allows attackers to cause multiple copies of a program to be loaded more quickly than the program can detect that other copies are running, then exit. This type of error should probably have its own category, where teardown takes more time than initialization. CVE-2006-6931 Network monitoring system allows remote attackers to cause a denial of service (CPU consumption and detection outage) via crafted network traffic, aka a "backtracking attack." CVE-2006-3380 Wiki allows remote attackers to cause a denial of service (CPU consumption) by performing a diff between large, crafted pages that trigger the worst case algorithmic complexity. CVE-2006-3379 Wiki allows remote attackers to cause a denial of service (CPU consumption) by performing a diff between large, crafted pages that trigger the worst case algorithmic complexity. CVE-2005-2506 OS allows attackers to cause a denial of service (CPU consumption) via crafted Gregorian dates. CVE-2005-1792 Memory leak by performing actions faster than the software can clear them. Cryptography Crosby Wallach Algorithmic Complexity Attacks http://www.cs.rice.edu/~scrosby/hash/CrosbyWallach_UsenixSec2003/index.html Algorithmic Complexity PLOVER Eric Dalci Cigital 2008-07-01 updated Time_of_Introduction CWE Content Team MITRE 2008-09-08 updated Common_Consequences, Relationships, Other_Notes, Taxonomy_Mappings CWE Content Team MITRE 2009-07-27 updated Functional_Areas, Other_Notes CWE Content Team MITRE 2009-10-29 updated Common_Consequences CWE Content Team MITRE 2009-12-28 updated Applicable_Platforms, Likelihood_of_Exploit CWE Content Team MITRE 2011-06-01 updated Common_Consequences CWE Content Team MITRE 2012-05-11 updated Observed_Examples, Relationships