Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-29483: n/a

0
High
VulnerabilityCVE-2023-29483cvecve-2023-29483
Published: Thu Apr 11 2024 (04/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:15:00 UTC

Technical Analysis

CVE-2023-29483 is a vulnerability rooted in the eventlet library versions prior to 0.35.2, which is used by dnspython versions before 2.6.0. The vulnerability allows remote attackers to interfere with DNS name resolution by rapidly sending invalid DNS packets from the expected source IP address and port. This attack, known as a "TuDoor" attack, exploits the fact that dnspython does not adhere to the preferred DNS resolution behavior of waiting for a valid response within the full timeout window. Instead, dnspython prematurely abandons the resolution process upon receiving an invalid packet, leading to potential denial of service or manipulation of DNS responses. The vulnerability affects the confidentiality, integrity, and availability of DNS resolution, as attackers can disrupt or manipulate DNS queries. The CVSS v3.1 base score is 7.0, reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and partial impacts on confidentiality and integrity with high impact on availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to systems relying on vulnerable dnspython versions. Notably, dnspython 2.6.0 is unusable due to a separate issue, and the fix is included in version 2.6.1. The vulnerability is tracked under CWE-292 (Improper Authentication).

Potential Impact

For European organizations, this vulnerability can lead to DNS resolution failures or disruptions, impacting critical services that rely on DNS, such as web applications, email, and internal network communications. Disrupted DNS resolution can cause denial of service conditions, degrade user experience, and potentially open avenues for further attacks if DNS queries are manipulated. Organizations using dnspython in network tools, monitoring systems, or custom applications are at risk. The impact is particularly significant for sectors dependent on reliable DNS, including finance, healthcare, government, and telecommunications. DNS failures can also affect compliance with regulations requiring availability and integrity of IT services. Given the network-based attack vector and no requirement for authentication, attackers can exploit this vulnerability remotely, increasing the threat surface for European entities.

Mitigation Recommendations

The primary mitigation is to upgrade dnspython to version 2.6.1 or later, which resolves the vulnerability and related issues. Additionally, ensure that eventlet is updated to version 0.35.2 or newer to eliminate the underlying cause. Organizations should audit their software dependencies to identify and remediate vulnerable dnspython versions. Implement network-level protections such as DNS query rate limiting and anomaly detection to identify and block rapid invalid DNS packets indicative of a TuDoor attack. Employ DNS security extensions (DNSSEC) where applicable to enhance DNS integrity. Monitoring DNS resolution logs for unusual patterns can help detect exploitation attempts. For critical infrastructure, consider fallback DNS resolvers or redundant DNS services to maintain availability during attacks. Finally, maintain an up-to-date inventory of Python libraries in use and integrate automated dependency scanning into the software development lifecycle.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-04-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b58ff58c9332ff08aed

Added to database: 11/4/2025, 5:43:52 PM

Last enriched: 11/4/2025, 10:15:00 PM

Last updated: 11/5/2025, 1:28:51 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats