๐Ÿ” CVE Alert

CVE-2025-59089

MEDIUM 5.9

Python-kdcproxy: remote dos via unbounded tcp upstream buffering

CVSS Score
5.9
EPSS Score
0.0%
EPSS Percentile
0th

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

CWE CWE-770
Vendor latchset
Product kdcproxy
Published Nov 12, 2025
Last Updated Jan 28, 2026
Stay Ahead of the Next One

Get instant alerts for latchset kdcproxy

Be the first to know when new medium vulnerabilities affecting latchset kdcproxy are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

latchset / kdcproxy
0 < 1.1.0
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 10.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.6 Extended Update Support
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21138 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21139 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21140 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21141 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21142 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21448 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21748 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21806 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21818 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21819 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21820 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21821 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:22982 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-59089 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2393958 github.com: https://github.com/latchset/kdcproxy/pull/68 github.com: https://github.com/latchset/kdcproxy/commit/c7675365aa20be11f03247966336c7613cac84e1

Credits

Red Hat would like to thank Arad Inbar for reporting this issue.