The adversary initiates an exploratory phase to get familiar with the system.
The adversary triggers a first action (such as holding a resource) and initiates a second action which will wait for the first one to finish.
If the target program has a deadlock condition, the program waits indefinitely resulting in a denial of service.
Weakness Name | |
---|---|
Unrestricted Externally Accessible Lock The product properly checks for the existence of a lock, but the lock can be externally controlled or influenced by an actor that is outside of the intended sphere of control. |
|
Unsynchronized Access to Shared Data in a Multithreaded Context The product does not properly synchronize shared data, such as static variables across threads, which can lead to undefined behavior and unpredictable data changes. |
|
Improper Synchronization The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes. |
|
Improper Locking The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
|
Deadlock The product contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock. |
|
Use of Blocking Code in Single-threaded, Non-blocking Context The product uses a non-blocking model that relies on a single threaded process for features such as scalability, but it contains code that can block when it is invoked. |
Name | Organization | Date | Date Release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns, Type (Relationship -> Attack_Pattern) | |
CAPEC Content Team | The MITRE Corporation | Updated Activation_Zone, Attack_Motivation-Consequences, Attack_Phases, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Probing_Techniques, Related_Weaknesses, Solutions_and_Mitigations | |
CAPEC Content Team | The MITRE Corporation | Updated References, Solutions_and_Mitigations | |
CAPEC Content Team | The MITRE Corporation | Updated Prerequisites | |
CAPEC Content Team | The MITRE Corporation | Updated References, Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Taxonomy_Mappings |