PyPi: Dnspython

CVE-2023-29483

Safety vulnerability ID: 65401

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Apr 11, 2024 Updated at Oct 05, 2024
Scan your Python projects for vulnerabilities →

Advisory

Dnspython affected versions are vulnerable to a DoS vulnerability highlighted in the "TuDoor" paper, where spoofed DNS responses could disrupt service. The update prevents denial of service by ignoring malicious packets, allowing the resolver to wait for valid responses until a query's timeout. This mitigation ensures continued service despite attempted attacks, enhancing the resolver's reliability and security.

Affected package

dnspython

Latest version: 2.7.0

DNS toolkit

Affected versions

Fixed versions

Vulnerability changelog

See [What's New](https://dnspython.readthedocs.io/en/latest/whatsnew.html) for details.

This release addresses the potential DoS issue discussed in the "TuDoor" paper (CVE-2023-29483). The dnspython stub resolver is vulnerable to a potential DoS if a bad-in-some-way response from the right address and port forged by an attacker arrives before a legitimate one on the UDP port dnspython is using for that query. In this situation, dnspython might switch to querying another resolver or give up entirely, possibly denying service for that resolution. This release addresses the issue by adopting the recommended mitigation, which is ignoring the bad packets and continuing to listen for a legitimate response until the timeout for the query has expired.

Thank you to all the contributors to this release, and, as usual, thanks to my co-maintainers: Tomáš Křížek, Petr Špaček, and Brian Wellington.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application