PT-2025-46676 · Kdcproxy+6 · Kdcproxy+6

Published

2025-02-12

·

Updated

2026-01-29

·

CVE-2025-59089

CVSS v3.1

5.9

Medium

AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions kdcproxy (affected versions not specified)
Description An attacker can cause a denial-of-service condition by forcing kdcproxy to connect to a KDC server under the attacker’s control, potentially through server-side request forgery. kdcproxy does not limit the length of TCP responses it accepts, leading to excessive memory allocation and CPU usage when receiving data from the KDC. The software copies the entire buffered stream into a new buffer with each recv() call, even during incomplete transfers. kdcproxy continues accepting incoming response chunks as long as the received data length differs from the length indicated in the response header, allowing an attacker to send unbounded data until a connection timeout is reached, potentially exhausting server resources. Multiple concurrent requests can lead to accept queue overflow, denying service to legitimate clients.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

DoS

Allocation of Resources Without Limits

Weakness Enumeration

Related Identifiers

ALSA-2025:21139
ALSA-2025:21140
ALSA-2025:21142
BDU:2026-03386
CESA-2025_21140
CVE-2025-59089
INFSA-2025_21139
INFSA-2025_21140
RHSA-2025_21139
RHSA-2025_21140

Affected Products

Almalinux
Centos
Debian
Red Hat
Red Os
Rocky Linux
Kdcproxy