Potential DoS via the Tudoor mechanism in eventlet and dnspython
Moderate severity
GitHub Reviewed
Published
Apr 11, 2024
to the GitHub Advisory Database
•
Updated Jun 26, 2024
Description
Published by the National Vulnerability Database
Apr 11, 2024
Published to the GitHub Advisory Database
Apr 11, 2024
Reviewed
Apr 12, 2024
Last updated
Jun 26, 2024
eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
References