CVE-2025-59089
BaseFortify
Publication date: 2025-11-12
Last updated on: 2026-04-20
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redhat | kdcproxy | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs when an attacker tricks kdcproxy into connecting to a malicious KDC server. Because kdcproxy does not limit the size of TCP responses, it repeatedly copies incoming data into new buffers even if the data transfer is incomplete. This behavior leads to excessive memory and CPU usage. The attacker can send unlimited data chunks until the connection times out, exhausting server resources and potentially causing denial of service.
How can this vulnerability impact me? :
The vulnerability can cause denial of service by exhausting server memory and CPU resources. Multiple concurrent exploit attempts can overflow the accept queue, preventing legitimate clients from accessing the service.