Логотип exploitDog
bind:"BDU:2026-03386" OR bind:"CVE-2025-59089"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2026-03386" OR bind:"CVE-2025-59089"

Количество 14

Количество 14

fstec логотип

BDU:2026-03386

около 1 года назад

Уязвимость функции Application.__handle_recv() прокси-сервера для протокола Kerberos Python-kdcproxy, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KD ...

CVSS3: 5.9
EPSS: Низкий
redos логотип

ROS-20260129-73-0026

2 месяца назад

Уязвимость python-kdcproxy

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hxcg-77v3-qx52

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
rocky логотип

RLSA-2025:21142

5 месяцев назад

Important: python-kdcproxy security update

EPSS: Низкий
rocky логотип

RLSA-2025:21140

4 месяца назад

Important: idm:DL1 security update

EPSS: Низкий
rocky логотип

RLSA-2025:21139

5 месяцев назад

Important: python-kdcproxy security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-22982

4 месяца назад

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21142

4 месяца назад

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21140

5 месяцев назад

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21139

4 месяца назад

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2026-03386

Уязвимость функции Application.__handle_recv() прокси-сервера для протокола Kerberos Python-kdcproxy, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KD ...

CVSS3: 5.9
0%
Низкий
5 месяцев назад
redos логотип
ROS-20260129-73-0026

Уязвимость python-kdcproxy

CVSS3: 5.9
0%
Низкий
2 месяца назад
github логотип
GHSA-hxcg-77v3-qx52

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
rocky логотип
RLSA-2025:21142

Important: python-kdcproxy security update

5 месяцев назад
rocky логотип
RLSA-2025:21140

Important: idm:DL1 security update

4 месяца назад
rocky логотип
RLSA-2025:21139

Important: python-kdcproxy security update

5 месяцев назад
oracle-oval логотип
ELSA-2025-22982

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-21142

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-21140

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

5 месяцев назад
oracle-oval логотип
ELSA-2025-21139

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

4 месяца назад

Уязвимостей на страницу