Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-29483
HistoryApr 11, 2024 - 2:15 p.m.

CVE-2023-29483

2024-04-1114:15:12
Debian Security Bug Tracker
security-tracker.debian.org
18
cve-2023-29483
eventlet
dnspython
remote attackers
dns name resolution
tudoor attack
ip address
source port
algorithm
time window
vulnerability
unix

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

13.1%

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a “TuDoor” attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

13.1%