eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dnspython
Dnspython dnspython Eventlet Eventlet eventlet Fedoraproject Fedoraproject fedora Netapp Netapp bootstrap Os Netapp hci Compute Node |
|
CPEs | cpe:2.3:a:dnspython:dnspython:*:*:*:*:*:*:*:* cpe:2.3:a:eventlet:eventlet:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Dnspython
Dnspython dnspython Eventlet Eventlet eventlet Fedoraproject Fedoraproject fedora Netapp Netapp bootstrap Os Netapp hci Compute Node |
Wed, 13 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:9 |
Tue, 27 Aug 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-292 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 07 Aug 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.14::el9 |

Status: PUBLISHED
Assigner: mitre
Published: 2024-04-11T00:00:00
Updated: 2024-08-27T18:43:46.973Z
Reserved: 2023-04-07T00:00:00
Link: CVE-2023-29483

Updated: 2024-08-02T14:07:46.291Z

Status : Analyzed
Published: 2024-04-11T14:15:12.010
Modified: 2025-06-17T20:50:56.137
Link: CVE-2023-29483
