CWE一覧に戻る
CWE-415

ダブルフリー

Double Free
脆弱性 レビュー中
JA

この製品は、同じメモリ・アドレスでfree()を2回呼び出している。

EN

The product calls free() twice on the same memory address.

Scope: Integrity, Confidentiality, Availability / Impact: Modify Memory; Execute Unauthorized Code or Commands
Choose a language that provides automatic memory management.
Ensure that each allocation is freed only once. After freeing a chunk, set the pointer to NULL to ensure the pointer cannot be freed again. In complicated error conditions, be sure that clean-up routines respect the state of allocation properly. If the language is object oriented, ensure that object destructors delete each chunk of memory only once.
Use a static analysis tool to find double free instances.
MITRE公式ページ — CWE-415