It's possible to exploit memory leak to create denial of service conditions via resources exhaustion.
vulners.com/securityvulns/securityvulns:doc:23048