支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-59089 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Python-kdcproxy: remote dos via unbounded tcp upstream buffering
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
不加限制或调节的资源分配
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
kdcproxy 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
kdcproxy是latchset开源的一个Python库 kdcproxy存在安全漏洞,该漏洞源于未强制执行TCP响应长度边界,可能导致拒绝服务攻击。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
latchsetkdcproxy 0 ~ 1.1.0 -
Red HatRed Hat Enterprise Linux 10 0:1.0.0-19.el10_1 ~ * cpe:/o:redhat:enterprise_linux:10.1
Red HatRed Hat Enterprise Linux 10.0 Extended Update Support 0:1.0.0-19.el10_0 ~ * cpe:/o:redhat:enterprise_linux_eus:10.0
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:0.3.2-3.el7_9.3 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 8 8100020251103113748.143e9e98 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8 8100020251028161822.823393f5 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 8020020251106022345.792f4060 ~ * cpe:/a:redhat:rhel_aus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 8040020251103205102.5b01ab7e ~ * cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Red HatRed Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On 8040020251103205102.5b01ab7e ~ * cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_tus:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Telecommunications Update Service 8080020251029082621.b0a6ceea ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 8.8 Update Services for SAP Solutions 8080020251029082621.b0a6ceea ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 9 0:1.0.0-9.el9_7 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions 0:1.0.0-7.el9_0.1 ~ * cpe:/a:redhat:rhel_e4s:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Update Services for SAP Solutions 0:1.0.0-7.el9_2.1 ~ * cpe:/a:redhat:rhel_e4s:9.2::appstream
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:1.0.0-7.el9_4.1 ~ * cpe:/a:redhat:rhel_eus:9.4::appstream
Red HatRed Hat Enterprise Linux 9.6 Extended Update Support 0:1.0.0-9.el9_6 ~ * cpe:/a:redhat:rhel_eus:9.6::appstream
二、漏洞 CVE-2025-59089 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-59089 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2025-59089 的评论

暂无评论


发表评论