CVE-2023-29483
📋 TL;DR
This vulnerability allows remote attackers to interfere with DNS name resolution by sending invalid packets from expected IP addresses and source ports, disrupting DNS queries. It affects systems using eventlet before 0.35.2 or dnspython before 2.6.0. The attack can cause DNS resolution failures or delays.
💻 Affected Systems
- eventlet
- dnspython
📦 What is this software?
Dnspython by Dnspython
Eventlet by Eventlet
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete DNS resolution failure leading to service disruption, denial of service, or redirection of traffic to malicious endpoints if combined with other attacks.
Likely Case
Intermittent DNS resolution failures causing application timeouts, connection issues, and degraded service performance.
If Mitigated
Minimal impact with proper network controls and monitoring; DNS resolution may experience brief delays but should recover.
🎯 Exploit Status
Attack requires sending invalid DNS packets from expected IP/port; exploit details are publicly documented in GitHub issues.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: eventlet 0.35.2, dnspython 2.6.1
Vendor Advisory: https://github.com/eventlet/eventlet/releases/tag/v0.35.2, https://github.com/rthalley/dnspython/releases/tag/v2.6.0
Restart Required: Yes
Instructions:
1. Identify applications using eventlet or dnspython. 2. Update eventlet to 0.35.2+ via pip: 'pip install eventlet>=0.35.2'. 3. Update dnspython to 2.6.1+ via pip: 'pip install dnspython>=2.6.1'. 4. Restart affected applications/services.
🔧 Temporary Workarounds
Network filtering
allImplement network controls to filter unexpected DNS traffic or rate-limit DNS queries.
Use alternative DNS resolver
allConfigure applications to use system DNS resolver or alternative libraries instead of vulnerable dnspython.
🧯 If You Can't Patch
- Implement network monitoring for DNS query anomalies and failed resolutions.
- Use DNS caching servers with rate limiting and packet validation.
🔍 How to Verify
Check if Vulnerable:
Check installed versions: 'pip show eventlet dnspython' and verify eventlet < 0.35.2 or dnspython < 2.6.0.
Check Version:
pip show eventlet dnspython | grep Version
Verify Fix Applied:
After update, confirm versions: 'pip show eventlet dnspython' should show eventlet >= 0.35.2 and dnspython >= 2.6.1.
📡 Detection & Monitoring
Log Indicators:
- Increased DNS query timeouts
- DNS resolution failures in application logs
- Unusual DNS response patterns
Network Indicators:
- Spike in DNS traffic from single sources
- Invalid DNS packets with spoofed source IP/port
- DNS response delays
SIEM Query:
source="dns_logs" AND (response_code="SERVFAIL" OR query_time > 5000) | stats count by src_ip
🔗 References
- https://github.com/eventlet/eventlet/issues/913
- https://github.com/eventlet/eventlet/releases/tag/v0.35.2
- https://github.com/rthalley/dnspython/issues/1045
- https://github.com/rthalley/dnspython/releases/tag/v2.6.0
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/
- https://security.netapp.com/advisory/ntap-20240510-0001/
- https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713
- https://www.dnspython.org/
- https://github.com/eventlet/eventlet/issues/913
- https://github.com/eventlet/eventlet/releases/tag/v0.35.2
- https://github.com/rthalley/dnspython/issues/1045
- https://github.com/rthalley/dnspython/releases/tag/v2.6.0
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3BNSIK5NFYSAP53Y45GOCMOQHHDLGIF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLRKR57IFVKQC2GCXZBFLCLBAWBWL3F6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOHJOO3OM65UIUUUVDEXMCTXNM6LXZEH/
- https://security.netapp.com/advisory/ntap-20240510-0001/
- https://security.snyk.io/vuln/SNYK-PYTHON-DNSPYTHON-6241713
- https://www.dnspython.org/