Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-5024

Опубликовано: 21 мая 2025
Источник: redhat
CVSS3: 7.4

Описание

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.

Отчет

The severity of this issue is considered moderate rather than important because successful exploitation requires the gnome-remote-desktop service to be actively configured and running in RDP mode, which is not enabled by default in most deployments. While the attack can be performed remotely and without authentication, it relies on sending specially crafted RDP packets that exploit a resource handling flaw, resulting in excessive consumption of system file descriptors and eventual denial of service. However, the vulnerability does not enable code execution, privilege escalation, or compromise of data integrity or confidentiality. The impact is therefore confined to service disruption rather than a direct security breach. Additionally, the attack vector involves sustained resource abuse over time, requiring specific environmental conditions, such as systemd-managed user services with elevated file descriptor limits. This further limits the exploitability in default or hardened configurations. As such, the potential for widespread exploitation is constrained by the need for non-default service activation and prolonged interaction, reducing its overall security impact when compared to vulnerabilities that offer immediate compromise or broader applicability across system roles.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gnome-remote-desktopAffected
Red Hat Enterprise Linux 8gnome-remote-desktopAffected
Red Hat Enterprise Linux 9gnome-remote-desktopAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2367717gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
27 дней назад

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.

CVSS3: 7.4
nvd
27 дней назад

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.

CVSS3: 7.4
debian
27 дней назад

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop li ...

CVSS3: 7.4
github
27 дней назад

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.

CVSS3: 7.4
fstec
29 дней назад

Уязвимость пакета для удаленного подключения к компьютеру GNOME Remote Desktop, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

7.4 High

CVSS3