First published: Thu Apr 11 2024(Updated: )
Dnspython is vulnerable to a denial of service, caused by a flaw in stub resolver when a bad-in-some-way response arrives before a legitimate one on the UDP port dnspython is using for that query. By sending a specially crafted query, a remote attacker could exploit this vulnerability to cause a denial of service condition.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/dnspython | <2.6.1 | 2.6.1 |
pip/eventlet | <0.35.2 | 0.35.2 |
redhat/dnspython | <2.6.0 | 2.6.0 |
IBM Rational Team Concert | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29483 has a severity rating that categorizes it as a denial of service vulnerability.
To fix CVE-2023-29483, update dnspython to version 2.6.1 or later, or downgrade to a secure version if using affected packages.
CVE-2023-29483 affects dnspython versions before 2.6.1, eventlet versions before 0.35.2, and IBM Concert Software versions up to 1.0.2.1.
CVE-2023-29483 is a denial of service vulnerability that can be exploited through specially crafted queries.
An attacker can exploit CVE-2023-29483 by sending a specially crafted query that disrupts the dnspython stub resolver's handling of responses.