0.0
NA
CVE-2024-3219
Windows CPython Socket Connection Race Vulnerability
Description

The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.

INFO

Published Date :

July 29, 2024, 10:15 p.m.

Last Modified :

Nov. 21, 2024, 9:29 a.m.

Remotely Exploitable :

No

Impact Score :

Exploitability Score :

Affected Products

The following products are affected by CVE-2024-3219 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Python python
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-3219.

URL Resource
http://www.openwall.com/lists/oss-security/2024/07/29/3
https://github.com/python/cpython/commit/06fa244666ec6335a3b9bf2367e31b42b9a89b20
https://github.com/python/cpython/commit/0b65c8bf5367625673eafb92f85046a1b31259f2
https://github.com/python/cpython/commit/220e31adeaaa8436c9ff234cba1398bc49e2bb6c
https://github.com/python/cpython/commit/2621a8a40ba4b2c68ca564671b7daa5da80a4508
https://github.com/python/cpython/commit/31302f5fc24eecd693f0c8aaba7c2840b09b594d
https://github.com/python/cpython/commit/3f5d9d12c74787fbf3f5891835c85cc15526c86d
https://github.com/python/cpython/commit/5df322e91a40909e6904bbdbc0c3a6b6a9eead39
https://github.com/python/cpython/commit/5f90abaa786f994db3907fc31e2ee00ea2cf0929
https://github.com/python/cpython/commit/b252317956b7fc035bb3774ef6a177e227f9fc54
https://github.com/python/cpython/commit/c21a36112a0028d7ac3cf8f480e0dc88dba5922c
https://github.com/python/cpython/commit/c5655aa6ad120d2ed7f255bebd6e8b71a9c07dde
https://github.com/python/cpython/commit/e319f774f9e766a2b92949444a2d46081df3363a
https://github.com/python/cpython/commit/f071f01b7b7e19d7d6b3a4b0ec62f820ecb14660
https://github.com/python/cpython/issues/122133
https://github.com/python/cpython/pull/122134
https://mail.python.org/archives/list/[email protected]/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/
http://www.openwall.com/lists/oss-security/2024/07/29/3
https://github.com/python/cpython/commit/06fa244666ec6335a3b9bf2367e31b42b9a89b20
https://github.com/python/cpython/commit/0b65c8bf5367625673eafb92f85046a1b31259f2
https://github.com/python/cpython/commit/220e31adeaaa8436c9ff234cba1398bc49e2bb6c
https://github.com/python/cpython/commit/5f90abaa786f994db3907fc31e2ee00ea2cf0929
https://github.com/python/cpython/commit/b252317956b7fc035bb3774ef6a177e227f9fc54
https://github.com/python/cpython/issues/122133
https://github.com/python/cpython/pull/122134
https://mail.python.org/archives/list/[email protected]/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-3219 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-3219 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2024/07/29/3
    Added Reference https://github.com/python/cpython/commit/06fa244666ec6335a3b9bf2367e31b42b9a89b20
    Added Reference https://github.com/python/cpython/commit/0b65c8bf5367625673eafb92f85046a1b31259f2
    Added Reference https://github.com/python/cpython/commit/220e31adeaaa8436c9ff234cba1398bc49e2bb6c
    Added Reference https://github.com/python/cpython/commit/5f90abaa786f994db3907fc31e2ee00ea2cf0929
    Added Reference https://github.com/python/cpython/commit/b252317956b7fc035bb3774ef6a177e227f9fc54
    Added Reference https://github.com/python/cpython/issues/122133
    Added Reference https://github.com/python/cpython/pull/122134
    Added Reference https://mail.python.org/archives/list/[email protected]/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Nov. 04, 2024

    Action Type Old Value New Value
    Added CWE CISA-ADP CWE-306
  • CVE Modified by [email protected]

    Oct. 17, 2024

    Action Type Old Value New Value
    Changed Description There is a MEDIUM severity vulnerability affecting CPython. The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included. The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.
    Removed CVSS V4.0 Python Software Foundation AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V4.0 Python Software Foundation CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • CVE Modified by [email protected]

    Aug. 22, 2024

    Action Type Old Value New Value
    Added CVSS V4.0 Python Software Foundation CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • CVE Modified by [email protected]

    Aug. 05, 2024

    Action Type Old Value New Value
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/31302f5fc24eecd693f0c8aaba7c2840b09b594d [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/3f5d9d12c74787fbf3f5891835c85cc15526c86d [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/c5655aa6ad120d2ed7f255bebd6e8b71a9c07dde [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/e319f774f9e766a2b92949444a2d46081df3363a [No types assigned]
  • CVE Modified by [email protected]

    Aug. 01, 2024

    Action Type Old Value New Value
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/2621a8a40ba4b2c68ca564671b7daa5da80a4508 [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/5df322e91a40909e6904bbdbc0c3a6b6a9eead39 [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/c21a36112a0028d7ac3cf8f480e0dc88dba5922c [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/f071f01b7b7e19d7d6b3a4b0ec62f820ecb14660 [No types assigned]
  • CVE Modified by [email protected]

    Jul. 30, 2024

    Action Type Old Value New Value
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/06fa244666ec6335a3b9bf2367e31b42b9a89b20 [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/0b65c8bf5367625673eafb92f85046a1b31259f2 [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/220e31adeaaa8436c9ff234cba1398bc49e2bb6c [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/5f90abaa786f994db3907fc31e2ee00ea2cf0929 [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/commit/b252317956b7fc035bb3774ef6a177e227f9fc54 [No types assigned]
  • CVE Modified by [email protected]

    Jul. 30, 2024

    Action Type Old Value New Value
    Added Reference Python Software Foundation http://www.openwall.com/lists/oss-security/2024/07/29/3 [No types assigned]
  • CVE Received by [email protected]

    Jul. 29, 2024

    Action Type Old Value New Value
    Added Description There is a MEDIUM severity vulnerability affecting CPython. The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.
    Added Reference Python Software Foundation https://github.com/python/cpython/pull/122134 [No types assigned]
    Added Reference Python Software Foundation https://github.com/python/cpython/issues/122133 [No types assigned]
    Added Reference Python Software Foundation https://mail.python.org/archives/list/[email protected]/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/ [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-3219 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

NONE - Vulnerability Scoring System