CVE-2023-29483: n/a
eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
AI Analysis
Technical Summary
CVE-2023-29483 is a vulnerability rooted in the eventlet library versions prior to 0.35.2, which is used by dnspython versions before 2.6.0. The vulnerability allows remote attackers to interfere with DNS name resolution by rapidly sending invalid DNS packets from the expected source IP address and port. This attack, known as a "TuDoor" attack, exploits the fact that dnspython does not adhere to the preferred DNS resolution behavior of waiting for a valid response within the full timeout window. Instead, dnspython prematurely abandons the resolution process upon receiving an invalid packet, leading to potential denial of service or manipulation of DNS responses. The vulnerability affects the confidentiality, integrity, and availability of DNS resolution, as attackers can disrupt or manipulate DNS queries. The CVSS v3.1 base score is 7.0, reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and partial impacts on confidentiality and integrity with high impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to systems relying on vulnerable dnspython versions. Notably, dnspython 2.6.0 is unusable due to a separate issue, and the fix is included in version 2.6.1. The vulnerability is tracked under CWE-292 (Improper Authentication).
Potential Impact
For European organizations, this vulnerability can lead to DNS resolution failures or disruptions, impacting critical services that rely on DNS, such as web applications, email, and internal network communications. Disrupted DNS resolution can cause denial of service conditions, degrade user experience, and potentially open avenues for further attacks if DNS queries are manipulated. Organizations using dnspython in network tools, monitoring systems, or custom applications are at risk. The impact is particularly significant for sectors dependent on reliable DNS, including finance, healthcare, government, and telecommunications. DNS failures can also affect compliance with regulations requiring availability and integrity of IT services. Given the network-based attack vector and no requirement for authentication, attackers can exploit this vulnerability remotely, increasing the threat surface for European entities.
Mitigation Recommendations
The primary mitigation is to upgrade dnspython to version 2.6.1 or later, which resolves the vulnerability and related issues. Additionally, ensure that eventlet is updated to version 0.35.2 or newer to eliminate the underlying cause. Organizations should audit their software dependencies to identify and remediate vulnerable dnspython versions. Implement network-level protections such as DNS query rate limiting and anomaly detection to identify and block rapid invalid DNS packets indicative of a TuDoor attack. Employ DNS security extensions (DNSSEC) where applicable to enhance DNS integrity. Monitoring DNS resolution logs for unusual patterns can help detect exploitation attempts. For critical infrastructure, consider fallback DNS resolvers or redundant DNS services to maintain availability during attacks. Finally, maintain an up-to-date inventory of Python libraries in use and integrate automated dependency scanning into the software development lifecycle.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2023-29483: n/a
Description
eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
AI-Powered Analysis
Technical Analysis
CVE-2023-29483 is a vulnerability rooted in the eventlet library versions prior to 0.35.2, which is used by dnspython versions before 2.6.0. The vulnerability allows remote attackers to interfere with DNS name resolution by rapidly sending invalid DNS packets from the expected source IP address and port. This attack, known as a "TuDoor" attack, exploits the fact that dnspython does not adhere to the preferred DNS resolution behavior of waiting for a valid response within the full timeout window. Instead, dnspython prematurely abandons the resolution process upon receiving an invalid packet, leading to potential denial of service or manipulation of DNS responses. The vulnerability affects the confidentiality, integrity, and availability of DNS resolution, as attackers can disrupt or manipulate DNS queries. The CVSS v3.1 base score is 7.0, reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and partial impacts on confidentiality and integrity with high impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to systems relying on vulnerable dnspython versions. Notably, dnspython 2.6.0 is unusable due to a separate issue, and the fix is included in version 2.6.1. The vulnerability is tracked under CWE-292 (Improper Authentication).
Potential Impact
For European organizations, this vulnerability can lead to DNS resolution failures or disruptions, impacting critical services that rely on DNS, such as web applications, email, and internal network communications. Disrupted DNS resolution can cause denial of service conditions, degrade user experience, and potentially open avenues for further attacks if DNS queries are manipulated. Organizations using dnspython in network tools, monitoring systems, or custom applications are at risk. The impact is particularly significant for sectors dependent on reliable DNS, including finance, healthcare, government, and telecommunications. DNS failures can also affect compliance with regulations requiring availability and integrity of IT services. Given the network-based attack vector and no requirement for authentication, attackers can exploit this vulnerability remotely, increasing the threat surface for European entities.
Mitigation Recommendations
The primary mitigation is to upgrade dnspython to version 2.6.1 or later, which resolves the vulnerability and related issues. Additionally, ensure that eventlet is updated to version 0.35.2 or newer to eliminate the underlying cause. Organizations should audit their software dependencies to identify and remediate vulnerable dnspython versions. Implement network-level protections such as DNS query rate limiting and anomaly detection to identify and block rapid invalid DNS packets indicative of a TuDoor attack. Employ DNS security extensions (DNSSEC) where applicable to enhance DNS integrity. Monitoring DNS resolution logs for unusual patterns can help detect exploitation attempts. For critical infrastructure, consider fallback DNS resolvers or redundant DNS services to maintain availability during attacks. Finally, maintain an up-to-date inventory of Python libraries in use and integrate automated dependency scanning into the software development lifecycle.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2023-04-07T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b58ff58c9332ff08aed
Added to database: 11/4/2025, 5:43:52 PM
Last enriched: 11/4/2025, 10:15:00 PM
Last updated: 11/5/2025, 1:28:51 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.