跳转到帖子

Oracle Linux: CVE-2023-29483: ELSA-2024-3275: python-dns security update (MODERATE) (Multiple Advisories)

recommended_posts

发布于
  • 超级管理员

Oracle Linux: CVE-2023-29483: ELSA-2024-3275:python-dns security update (MODERATE) (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:C)
Published
02/09/2024
Created
06/01/2024
Added
05/30/2024
Modified
11/30/2024

Description

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1. The dnspython stub resolver is vulnerable to a denial of service (DoS) risk if an attacker sends a malicious response forged with the correct address and port before a legitimate one arrives on the UDP port used by dnspython for the query. In such cases, dnspython could either switch to another resolver or abandon the query altogether, potentially leading to service denial for that resolution.

Solution(s)

  • oracle-linux-upgrade-python3-dns

References

  • https://attackerkb.com/topics/cve-2023-29483
  • CVE - 2023-29483
  • ELSA-2024-3275
  • ELSA-2024-9423
  • 查看数 706
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…