Логотип exploitDog
bind:CVE-2025-59089
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59089

Количество 12

Количество 12

ubuntu логотип

CVE-2025-59089

3 месяца назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2025-59089

3 месяца назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2025-59089

3 месяца назад

If an attacker causes kdcproxy to connect to an attacker-controlled KD ...

CVSS3: 5.9
EPSS: Низкий
redos логотип

ROS-20260129-73-0026

11 дней назад

Уязвимость python-kdcproxy

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hxcg-77v3-qx52

3 месяца назад

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
EPSS: Низкий
rocky логотип

RLSA-2025:21142

3 месяца назад

Important: python-kdcproxy security update

EPSS: Низкий
rocky логотип

RLSA-2025:21140

2 месяца назад

Important: idm:DL1 security update

EPSS: Низкий
rocky логотип

RLSA-2025:21139

3 месяца назад

Important: python-kdcproxy security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-22982

около 2 месяцев назад

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21142

2 месяца назад

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21140

3 месяца назад

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21139

3 месяца назад

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-59089

If an attacker causes kdcproxy to connect to an attacker-controlled KD ...

CVSS3: 5.9
0%
Низкий
3 месяца назад
redos логотип
ROS-20260129-73-0026

Уязвимость python-kdcproxy

CVSS3: 5.9
0%
Низкий
11 дней назад
github логотип
GHSA-hxcg-77v3-qx52

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CVSS3: 5.9
0%
Низкий
3 месяца назад
rocky логотип
RLSA-2025:21142

Important: python-kdcproxy security update

3 месяца назад
rocky логотип
RLSA-2025:21140

Important: idm:DL1 security update

2 месяца назад
rocky логотип
RLSA-2025:21139

Important: python-kdcproxy security update

3 месяца назад
oracle-oval логотип
ELSA-2025-22982

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-21142

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

2 месяца назад
oracle-oval логотип
ELSA-2025-21140

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-21139

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

3 месяца назад

Уязвимостей на страницу