CVE-2023-29483

7.0 HIGH
Published: April 11, 2024 Modified: November 04, 2025

Description

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/eventlet/eventlet/issues/913
Source: cve@mitre.org
Exploit Issue Tracking
https://github.com/rthalley/dnspython/issues/1045
Source: cve@mitre.org
Exploit Issue Tracking
https://security.netapp.com/advisory/ntap-20240510-0001/
Source: cve@mitre.org
Third Party Advisory
https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713
Source: cve@mitre.org
Third Party Advisory
https://www.dnspython.org/
Source: cve@mitre.org
Product
https://github.com/eventlet/eventlet/issues/913
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking
https://github.com/eventlet/eventlet/releases/tag/v0.35.2
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/rthalley/dnspython/issues/1045
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking
https://github.com/rthalley/dnspython/releases/tag/v2.6.0
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://security.netapp.com/advisory/ntap-20240510-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.dnspython.org/
Source: af854a3a-2127-422b-91ae-364da2661108
Product

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.0 / 10.0
EPSS (Exploit Probability)
5.0%
89th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

eventlet dnspython fedoraproject netapp