Insecure permissions lead to ability of resource exhaustion.
vulners.com/securityvulns/securityvulns:doc:8530