Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition.
History

Wed, 30 Oct 2024 02:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Tue, 29 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Pylons
Pylons waitress
CPEs cpe:2.3:a:pylons:waitress:*:*:*:*:*:*:*:*
Vendors & Products Pylons
Pylons waitress
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
Description Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition.
Title Waitress has a denial of service leading to high CPU usage/resource exhaustion
Weaknesses CWE-772
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-29T14:18:40.951Z

Updated: 2024-10-29T14:56:55.296Z

Reserved: 2024-10-18T13:43:23.457Z

Link: CVE-2024-49769

cve-icon Vulnrichment

Updated: 2024-10-29T14:56:51.368Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-29T15:15:12.030

Modified: 2024-11-01T12:57:35.843

Link: CVE-2024-49769

cve-icon Redhat

Severity : Important

Publid Date: 2024-10-29T14:18:40Z

Links: CVE-2024-49769 - Bugzilla