Логотип exploitDog
bind:"CVE-2025-59088" OR bind:"CVE-2025-59089"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-59088" OR bind:"CVE-2025-59089"

Количество 21

Количество 21

rocky логотип

RLSA-2025:21142

5 месяцев назад

Important: python-kdcproxy security update

EPSS: Низкий
rocky логотип

RLSA-2025:21140

4 месяца назад

Important: idm:DL1 security update

EPSS: Низкий
rocky логотип

RLSA-2025:21139

5 месяцев назад

Important: python-kdcproxy security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-22982

4 месяца назад

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21142

4 месяца назад

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21140

5 месяцев назад

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21139

4 месяца назад

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2025-59089

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KD ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
nvd логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server ...

CVSS3: 8.6
EPSS: Низкий
redos логотип

ROS-20260129-73-0026

2 месяца назад

Уязвимость python-kdcproxy

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hxcg-77v3-qx52

5 месяцев назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-crfg-8xhr-7q4w

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2026-03011

5 месяцев назад

Уязвимость прокси-сервера для протокола Kerberos Python-kdcproxy, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 8.6
EPSS: Низкий
redos логотип

ROS-20260129-73-0027

2 месяца назад

Уязвимость python-kdcproxy

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:21142

Important: python-kdcproxy security update

5 месяцев назад
rocky логотип
RLSA-2025:21140

Important: idm:DL1 security update

4 месяца назад
rocky логотип
RLSA-2025:21139

Important: python-kdcproxy security update

5 месяцев назад
oracle-oval логотип
ELSA-2025-22982

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-21142

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-21140

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

5 месяцев назад
oracle-oval логотип
ELSA-2025-21139

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

4 месяца назад
ubuntu логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KD ...

CVSS3: 5.9
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server ...

CVSS3: 8.6
0%
Низкий
5 месяцев назад
redos логотип
ROS-20260129-73-0026

Уязвимость python-kdcproxy

CVSS3: 5.9
0%
Низкий
2 месяца назад
github логотип
GHSA-hxcg-77v3-qx52

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
github логотип
GHSA-crfg-8xhr-7q4w

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2026-03011

Уязвимость прокси-сервера для протокола Kerberos Python-kdcproxy, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 8.6
0%
Низкий
5 месяцев назад
redos логотип
ROS-20260129-73-0027

Уязвимость python-kdcproxy

CVSS3: 8.6
0%
Низкий
2 месяца назад

Уязвимостей на страницу