[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Asymmetric Resource Consumption (Amplification)

ID: 405Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Class





Description

Software that does not appropriately monitor or control resource consumption can lead to adverse system performance.

Extended Description

This situation is amplified if the software allows malicious users or attackers to consume more resources than their access level permits. Exploiting such a weakness can lead to asymmetric resource consumption, aiding in amplification attacks against the system or the network.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Operation
  • Architecture and Design
  • Implementation

Common Consequences

ScopeTechnical ImpactNotes
Availability
 
DoS: amplification
DoS: resource consumption (other)
 
Sometimes this is a factor in "flood" attacks, but other types of amplification exist.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
 
 An application must make resources available to a client commensurate with the client's access level.
 
  
Architecture and Design
 
 An application must, at all times, keep track of allocated resources and meter their usage appropriately.
 
  

Relationships

Related CWETypeViewChain
CWE-405 ChildOf CWE-907 Category CWE-888  

Demonstrative Examples
None

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Asymmetric resource consumption (amplification)
 
 
OWASP Top Ten 2004 A9
 
Denial of Service
 
CWE_More_Specific
 
WASC 41
 
XML Attribute Blowup
 
 
CERT Java Secure Coding TPS00-J
 
Use thread pools to enable graceful degradation of service during traffic bursts
 
 
CERT Java Secure Coding FIO04-J
 
Release resources when they are no longer needed
 
 

References:
None

CVE    2
CVE-2021-21359
CVE-2018-15492

© SecPod Technologies