• 公告ID (KylinSec-SA-2024-3893)

摘要:

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

安全等级: Low

公告ID: KylinSec-SA-2024-3893

发布日期: 2024年10月12日

关联CVE: CVE-2023-29483  

  • 详细介绍

1. 漏洞描述

   

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2023-29483 KY3.4-5 python-dnspython Unaffected
CVE-2023-29483 KY3.5.2 python-dnspython Unaffected
CVE-2023-29483 V6 python-dnspython Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3892 下一篇:KylinSec-SA-2024-3894