An unauthenticated remote attacker can gain service level privileges through an incomplete cleanup during service restart after a DoS.
Weakness
The product does not properly “clean up” and remove temporary or supporting resources after they have been used.
Potential Mitigations
References