Adacore Ada Web Server (AWS) before 25.2 is vulnerable to a denial-of-service (DoS) condition due to improper handling of SSL handshakes during connection initialization. When a client initiates an HTTPS connection, the server performs the SSL handshake before assigning the connection to a processing slot. However, there is no specific timeout set for this phase, and the server uses the default socket timeout, which is effectively infinite. An attacker can exploit this by sending a malformed TLS ClientHello message with incorrect length values. This causes the server to wait indefinitely for data that never arrives, blocking the worker thread (Line) handling the connection. By opening multiple such connections, up to the server's maximum limit, the attacker can exhaust all available working threads, preventing the server from handling new, legitimate requests.
Metrics
Affected Vendors & Products
References
History
Thu, 04 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Adacore
Adacore ada Web Server |
|
Vendors & Products |
Adacore
Adacore ada Web Server |
Wed, 03 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 CWE-770 |
|
Metrics |
cvssV3_1
|
Wed, 03 Sep 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Adacore Ada Web Server (AWS) before 25.2 is vulnerable to a denial-of-service (DoS) condition due to improper handling of SSL handshakes during connection initialization. When a client initiates an HTTPS connection, the server performs the SSL handshake before assigning the connection to a processing slot. However, there is no specific timeout set for this phase, and the server uses the default socket timeout, which is effectively infinite. An attacker can exploit this by sending a malformed TLS ClientHello message with incorrect length values. This causes the server to wait indefinitely for data that never arrives, blocking the worker thread (Line) handling the connection. By opening multiple such connections, up to the server's maximum limit, the attacker can exhaust all available working threads, preventing the server from handling new, legitimate requests. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-03T17:54:40.897Z
Reserved: 2025-06-17T00:00:00.000Z
Link: CVE-2025-52494

Updated: 2025-09-03T17:53:13.647Z

Status : Awaiting Analysis
Published: 2025-09-03T18:15:35.120
Modified: 2025-09-04T15:35:29.497
Link: CVE-2025-52494

No data.

Updated: 2025-09-04T13:12:22Z