use after free

mälu järelkasutus, järelkasutusviga

olemus
CWE-416:
mälueraldise kasutamine pärast ta vabastamist, võib tekitada krahhi, võib kasutada ootamatuid väärtusi, võib käivitada koodi
= referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code
Wiktionary:
a class of software vulnerability where memory is erroneously used again after being deallocated

ülevaateid
https://cwe.mitre.org/data/definitions/416.html
https://www.owasp.org/index.php/Using_freed_memory
https://www.purehacking.com/blog/lloyd-simon/an-introduction-to-use-after-free-vulnerabilities
https://blogs.cisco.com/security/talos/exploiting-use-after-free
https://gruss.cc/files/uafmail.pdf
https://en.wikipedia.org/wiki/Dangling_pointer
https://pure.security/introduction-to-use-after-free-vulnerabilities/

tõrje
https://www.usenix.org/system/files/sec21summer_wickman.pdf
http://www.swlab.cs.okayama-u.ac.jp/~yamauchi/research/E100.D_2016INP0020.pdf
https://www.eecis.udel.edu/~hnw/paper/ccs18.pdf

vt ka
- rippuv viit

Toimub laadimine

use after free

mälu järelkasutus, järelkasutusviga

olemus
CWE-416:
mälueraldise kasutamine pärast ta vabastamist, võib tekitada krahhi, võib kasutada ootamatuid väärtusi, võib käivitada koodi
= referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code
Wiktionary:
a class of software vulnerability where memory is erroneously used again after being deallocated

ülevaateid
https://cwe.mitre.org/data/definitions/416.html
https://www.owasp.org/index.php/Using_freed_memory
https://www.purehacking.com/blog/lloyd-simon/an-introduction-to-use-after-free-vulnerabilities
https://blogs.cisco.com/security/talos/exploiting-use-after-free
https://gruss.cc/files/uafmail.pdf
https://en.wikipedia.org/wiki/Dangling_pointer
https://pure.security/introduction-to-use-after-free-vulnerabilities/

tõrje
https://www.usenix.org/system/files/sec21summer_wickman.pdf
http://www.swlab.cs.okayama-u.ac.jp/~yamauchi/research/E100.D_2016INP0020.pdf
https://www.eecis.udel.edu/~hnw/paper/ccs18.pdf

vt ka
- rippuv viit

Palun oodake...

Tõrge

use after free

mälu järelkasutus, järelkasutusviga

olemus
CWE-416:
mälueraldise kasutamine pärast ta vabastamist, võib tekitada krahhi, võib kasutada ootamatuid väärtusi, võib käivitada koodi
= referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code
Wiktionary:
a class of software vulnerability where memory is erroneously used again after being deallocated

ülevaateid
https://cwe.mitre.org/data/definitions/416.html
https://www.owasp.org/index.php/Using_freed_memory
https://www.purehacking.com/blog/lloyd-simon/an-introduction-to-use-after-free-vulnerabilities
https://blogs.cisco.com/security/talos/exploiting-use-after-free
https://gruss.cc/files/uafmail.pdf
https://en.wikipedia.org/wiki/Dangling_pointer
https://pure.security/introduction-to-use-after-free-vulnerabilities/

tõrje
https://www.usenix.org/system/files/sec21summer_wickman.pdf
http://www.swlab.cs.okayama-u.ac.jp/~yamauchi/research/E100.D_2016INP0020.pdf
https://www.eecis.udel.edu/~hnw/paper/ccs18.pdf

vt ka
- rippuv viit

Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!