The product does not properly "clean up" and remove temporary or supporting resources after they have been used.
N/A
Threat Mapped score: 1.8
Industry: Finiancial
Threat priority: P4 - Informational (Low)
CVE: CVE-2000-0552
World-readable temporary file not deleted after use.
CVE: CVE-2005-2293
Temporary file not deleted after use, leaking database usernames and passwords.
CVE: CVE-2002-0788
Interaction error creates a temporary file that can not be deleted due to strong permissions.
CVE: CVE-2002-2066
Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak).
CVE: CVE-2002-2067
Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak).
CVE: CVE-2002-2068
Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak).
CVE: CVE-2002-2069
Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak).
CVE: CVE-2002-2070
Alternate data streams for NTFS files are not cleared when files are wiped (alternate channel / infoleak).
CVE: CVE-2005-1744
Users not logged out when application is restarted after security-relevant changes were made.
N/A
N/A
Phase | Note |
---|---|
Implementation | N/A |
Intro: Stream resources in a Java application should be released in a finally block, otherwise an exception thrown before the call to close() would result in an unreleased I/O resource. In the example below, the close() method is called in the try block (incorrect).
try { InputStream is = new FileInputStream(path); byte b[] = new byte[is.available()]; is.read(b); is.close(); } catch (Throwable t) { log.error("Something bad happened: " + t.getMessage()); }