CVE-2023-29483

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
Debian logo
Debian Releases
Debian Product
Codename
dnspython
bullseye
ignored
bookworm
ignored
buster
ignored
trixie
2.6.1-1
fixed
sid
2.7.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnspython
oracular
not-affected
noble
not-affected
mantic
ignored
jammy
needed
focal
needed
bionic
needs-triage
xenial
needs-triage
trusty
ignored