When an application continuously allocates additional resources exhausting machine resources, leading the system to hang or crash.
\
When exploited, vulnerabilities in apps, software, or system security that hang, crash, or interfere with external programs perform designated tasks properly.
\
Memory leaks can lead to resource exhaustion (see “memory leaks” in this session).
\
However, these attacks can be executed by exhausting other resource subsystems, such as CPU, disk, or network.
\
Countermeasures: Good software development practices (e.g. preventing memory leaks), limiting what files and apps can be executed on endpoints.