Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-59089— Python-kdcproxy: remote dos via unbounded tcp upstream buffering

CVSS 5.9 · Medium EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-59089

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Python-kdcproxy: remote dos via unbounded tcp upstream buffering
Source: NVD (National Vulnerability Database)
Vulnerability Description
If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
kdcproxy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
kdcproxy是latchset开源的一个Python库 kdcproxy存在安全漏洞,该漏洞源于未强制执行TCP响应长度边界,可能导致拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
latchsetkdcproxy 0 ~ 1.1.0 -
Red HatRed Hat Enterprise Linux 10 0:1.0.0-19.el10_1 ~ * cpe:/o:redhat:enterprise_linux:10.1
Red HatRed Hat Enterprise Linux 10.0 Extended Update Support 0:1.0.0-19.el10_0 ~ * cpe:/o:redhat:enterprise_linux_eus:10.0
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:0.3.2-3.el7_9.3 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 8 8100020251103113748.143e9e98 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8 8100020251028161822.823393f5 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 8020020251106022345.792f4060 ~ * cpe:/a:redhat:rhel_aus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 8040020251103205102.5b01ab7e ~ * cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Red HatRed Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On 8040020251103205102.5b01ab7e ~ * cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Telecommunications Update Service 8080020251029082621.b0a6ceea ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 8.8 Update Services for SAP Solutions 8080020251029082621.b0a6ceea ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 9 0:1.0.0-9.el9_7 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions 0:1.0.0-7.el9_0.1 ~ * cpe:/a:redhat:rhel_e4s:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Update Services for SAP Solutions 0:1.0.0-7.el9_2.1 ~ * cpe:/a:redhat:rhel_e4s:9.2::appstream
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:1.0.0-7.el9_4.1 ~ * cpe:/a:redhat:rhel_eus:9.4::appstream
Red HatRed Hat Enterprise Linux 9.6 Extended Update Support 0:1.0.0-9.el9_6 ~ * cpe:/a:redhat:rhel_eus:9.6::appstream

II. Public POCs for CVE-2025-59089

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-59089

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-59089

No comments yet


Leave a comment