eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
| AND |
|
History
04 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-04-11 14:15
Updated : 2025-11-04 18:15
NVD link : CVE-2023-29483
Mitre link : CVE-2023-29483
CVE.ORG link : CVE-2023-29483
JSON object : View
Products Affected
dnspython
- dnspython
eventlet
- eventlet
fedoraproject
- fedora
netapp
- hci_compute_node
- bootstrap_os
CWE
CWE-292
DEPRECATED: Trusting Self-reported DNS Name
