Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-29483

Опубликовано: 09 фев. 2024
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

The dnspython stub resolver is vulnerable to a denial of service (DoS) risk if an attacker sends a malicious response forged with the correct address and port before a legitimate one arrives on the UDP port used by dnspython for the query. In such cases, dnspython could either switch to another resolver or abandon the query altogether, potentially leading to service denial for that resolution.

Отчет

The vulnerability in dnspython where it may accept a malicious DNS response over a legitimate one due to timing issues poses a moderate severity risk. While the impact is limited to potential denial of service for DNS resolution requests, it requires precise timing and the ability to send malicious responses before legitimate ones arrive. This attack vector relies on the attacker's ability to predict or manipulate the timing of DNS responses, making it more complex to exploit compared to other vulnerabilities. However, if successfully exploited, it can disrupt DNS resolution services, affecting the availability of the targeted domain or service.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2aap-cloud-metrics-collector-containerAffected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-dellemc-openmanage-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/platform-resource-runner-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/ansible-builder-rhel8Not affected
Red Hat Enterprise Linux 10python-dnsNot affected
Red Hat Enterprise Linux 7python-dnsOut of support scope
Red Hat Enterprise Linux 8python27:2.7/python-dnsWill not fix
Red Hat OpenStack Platform 17.1python-eventletAffected
Red Hat Ansible Automation Platform 2.4 for RHEL 8ansible-automation-platform-24/ee-supported-rhel8FixedRHSA-2024:348330.05.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-696
https://bugzilla.redhat.com/show_bug.cgi?id=2274520dnspython: denial of service in stub resolver

EPSS

Процентиль: 77%
0.01121
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
около 1 года назад

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

CVSS3: 7
nvd
около 1 года назад

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

CVSS3: 7
debian
около 1 года назад

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remo ...

suse-cvrf
9 месяцев назад

Security update for python-dnspython

suse-cvrf
9 месяцев назад

Security update for python-dnspython

EPSS

Процентиль: 77%
0.01121
Низкий

5.9 Medium

CVSS3