Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-29483

Опубликовано: 11 апр. 2024
Источник: debian
EPSS Низкий

Описание

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnspythonfixed2.6.0-1package
dnspythonignoredbookwormpackage
dnspythonignoredbullseyepackage
dnspythonignoredbusterpackage

Примечания

  • https://www.dnspython.org/news/2.6.0rc1/

  • https://github.com/rthalley/dnspython/commit/f66e25b5f549acf66d1fb6ead13eb3cff7d09af3 (v2.6.0rc1)

  • https://github.com/rthalley/dnspython/commit/e093299a49967696b1c58b68e4767de5031a3e46 (v2.6.0)

  • Upstream recommends not backporting fix:

  • https://github.com/rthalley/dnspython/issues/1051#issuecomment-1949383928

EPSS

Процентиль: 77%
0.01121
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
около 1 года назад

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

CVSS3: 5.9
redhat
больше 1 года назад

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

CVSS3: 7
nvd
около 1 года назад

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

suse-cvrf
9 месяцев назад

Security update for python-dnspython

suse-cvrf
9 месяцев назад

Security update for python-dnspython

EPSS

Процентиль: 77%
0.01121
Низкий