Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 29 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pylons
Pylons waitress |
|
CPEs | cpe:2.3:a:pylons:waitress:*:*:*:*:*:*:*:* | |
Vendors & Products |
Pylons
Pylons waitress |
|
Metrics |
ssvc
|
Tue, 29 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition. | |
Title | Waitress has a denial of service leading to high CPU usage/resource exhaustion | |
Weaknesses | CWE-772 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-29T14:18:40.951Z
Updated: 2024-10-29T14:56:55.296Z
Reserved: 2024-10-18T13:43:23.457Z
Link: CVE-2024-49769
Vulnrichment
Updated: 2024-10-29T14:56:51.368Z
NVD
Status : Awaiting Analysis
Published: 2024-10-29T15:15:12.030
Modified: 2024-11-01T12:57:35.843
Link: CVE-2024-49769
Redhat