CVE-2023-29483

EUVD-2024-1084
eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
CISA-ADPADP
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
Affected Products (NVD)
VendorProductVersion
eventleteventlet
𝑥
< 0.35.2
dnspythondnspython
𝑥
< 2.6.0
netappbootstrap_os
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dnspython
bookworm
ignored
bullseye
ignored
buster
ignored
sid
2.7.0-1
fixed
trixie
2.6.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnspython
bionic
needs-triage
focal
needed
jammy
needed
mantic
ignored
noble
not-affected
oracular
not-affected
trusty
ignored
xenial
needs-triage
References