CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
AI Translation Available

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

Status
draft
Abstraction
class
Likelihood
medium
C C++ Java Mobile ICS/OT

A race condition occurs within concurrent environments, and it is effectively a property of a code sequence. Depending on the context, a code sequence may be in the form of a function call, a small number of instructions, a series of program invocations, etc.

A race condition violates these properties, which are closely related:

- Exclusivity - the code sequence is given exclusive access to the shared resource, i.e., no other code sequence can modify properties of the shared resource before the original sequence has completed execution.

- Atomicity - the code sequence is behaviorally atomic, i.e., no other thread or process can concurrently execute the same sequence of instructions (or a subset) against the same resource.

A race condition exists when an 'interfering code sequence' can still access the shared resource, violating exclusivity.

The interfering code sequence could be 'trusted' or 'untrusted.' A trusted interfering code sequence occurs within the product; it cannot be modified by the attacker, and it can only be invoked indirectly. An untrusted interfering code sequence can be authored directly by the attacker, and typically it is external to the vulnerable product.

Common Consequences

availability confidentiality integrity access control
Impacts
dos: resource consumption (cpu) dos: resource consumption (memory) dos: resource consumption (other) dos: crash, exit, or restart dos: instability read files or directories read application data execute unauthorized code or commands gain privileges or assume identity bypass protection mechanism

Detection Methods

black box white box automated dynamic analysis automated static analysis - binary or bytecode dynamic analysis with automated results interpretation dynamic analysis with manual results interpretation manual static analysis - source code automated static analysis - source code architecture or design review

Potential Mitigations

Phases:
architecture and design implementation operation
Descriptions:
• Use thread-safe capabilities such as the data access abstraction in Spring.
• When using multithreading and operating on shared variables, only use thread-safe functions.
• Use a mutex if available, but be sure to avoid related weaknesses such as CWE-412.
• Disable interrupts or signals over critical parts of the code, but also make sure that the code does not go into a large or infinite loop.
• Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.
• In languages that support it, use synchronization primitives. Only wrap these around critical code to minimize the impact on performance.
• Minimize the usage of shared resources in order to remove as much complexity as possible from the control flow and to reduce the likelihood of unexpected conditions occurring. Additionally, this will minimize the amount of synchronization necessary and may even help to reduce the likelihood of a denial of service where an attacker may be able to repeatedly trigger a critical section (CWE-400).
• Use atomic operations on shared variables. Be wary of innocent-looking constructs such as "x++". This may appear atomic at the code layer, but it is actually non-atomic at the instruction layer, since it involves a read, followed by a computation, followed by a write.
• Avoid double-checked locking (CWE-609) and other implementation errors that arise when trying to avoid the overhead of synchronization.
• Use the volatile type modifier for critical variables to avoid unexpected compiler optimization or reordering. This does not necessarily solve the synchronization problem, but it can help.