CVE-2024-52804

Tornado is a Python web framework and asynchronous networking library. The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. Version 6.4.2 fixes the issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 45%
Debian logo
Debian Releases
Debian Product
Codename
python-tornado
bullseye
vulnerable
bullseye (security)
6.1.0-1+deb11u2
fixed
bookworm
6.2.0-3+deb12u1
fixed
sid
6.4.2-3
fixed
trixie
6.4.2-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-tornado
plucky
Fixed 6.4.2-1
released
oracular
Fixed 6.4.1-2ubuntu0.1
released
noble
Fixed 6.4.0-1ubuntu0.1
released
jammy
Fixed 6.1.0-3ubuntu0.1~esm1
released
focal
Fixed 6.0.3+really5.1.1-3ubuntu0.1~esm1
released
bionic
Fixed 4.5.3-1ubuntu0.2+esm1
released
xenial
not-affected