Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59089: Allocation of Resources Without Limits or Throttling in latchset kdcproxy

0
Medium
VulnerabilityCVE-2025-59089cvecve-2025-59089
Published: Wed Nov 12 2025 (11/12/2025, 16:40:50 UTC)
Source: CVE Database V5
Vendor/Project: latchset
Product: kdcproxy

Description

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:59:38 UTC

Technical Analysis

CVE-2025-59089 is a vulnerability in the latchset kdcproxy component that results from improper handling of TCP response data from a KDC (Key Distribution Center) server. Specifically, kdcproxy does not impose limits or throttling on the length of incoming TCP responses. When kdcproxy connects to a KDC server, it receives responses in chunks via the recv() system call. However, on each recv() call, kdcproxy copies the entire buffered stream into a new buffer, even if the transfer is incomplete. This inefficient memory handling causes excessive memory allocation and increased CPU usage. Furthermore, kdcproxy continues to accept incoming response chunks as long as the total received data length does not exactly match the length specified in the response header, even if individual chunks or the total buffer exceed the maximum allowed size for a Kerberos message. This behavior allows an attacker controlling a malicious KDC server to send unbounded amounts of data until the connection times out (approximately 12 seconds), leading to resource exhaustion. When multiple such requests occur concurrently, the accept queue can overflow, resulting in denial of service for legitimate clients. The vulnerability requires no authentication or user interaction, but the attack complexity is higher due to the need to induce kdcproxy to connect to an attacker-controlled KDC, potentially via server-side request forgery (SSRF). The CVSS v3.1 base score is 5.9, reflecting a medium severity with network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high availability impact. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to availability in environments using kdcproxy for Kerberos authentication proxying.

Potential Impact

The primary impact of CVE-2025-59089 is denial of service (DoS) due to resource exhaustion on servers running latchset kdcproxy. Organizations relying on kdcproxy as a proxy for Kerberos Key Distribution Center communications may experience service outages or degraded performance when targeted by this attack. The vulnerability can be exploited remotely without authentication, increasing the attack surface. Exhaustion of memory and CPU resources can lead to server crashes or unresponsiveness, disrupting authentication services that depend on Kerberos, potentially affecting access to critical internal systems and services. Multiple concurrent exploit attempts can overwhelm the accept queue, preventing legitimate client connections and amplifying the denial of service effect. This can impact enterprise environments, cloud providers, and any infrastructure using kdcproxy to proxy Kerberos traffic. Although confidentiality and integrity are not directly affected, the availability impact can cause significant operational disruption, especially in environments where Kerberos authentication is critical for identity and access management. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability's characteristics make it a viable target for attackers aiming to disrupt services.

Mitigation Recommendations

To mitigate CVE-2025-59089, organizations should implement the following specific measures: 1) Apply any available patches or updates from latchset or downstream vendors addressing this vulnerability as soon as they are released. 2) If patches are not yet available, implement network-level controls to restrict kdcproxy's ability to connect to untrusted or attacker-controlled KDC servers, such as firewall rules or network segmentation. 3) Monitor kdcproxy resource usage (memory and CPU) and connection patterns to detect abnormal spikes indicative of exploitation attempts. 4) Configure timeouts and limits on TCP connections to reduce the window for resource exhaustion attacks. 5) Employ rate limiting or connection throttling on kdcproxy to prevent accept queue overflow from multiple concurrent malicious requests. 6) Review and harden any server-side request forgery (SSRF) vulnerabilities that could be leveraged to force kdcproxy to connect to attacker-controlled servers. 7) Conduct regular security assessments and penetration testing focusing on kdcproxy and Kerberos infrastructure to identify and remediate weaknesses. These targeted mitigations go beyond generic advice by focusing on controlling kdcproxy's external connections, resource monitoring, and limiting attack surface exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-09-08T21:43:30.846Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914bbf8be619665a2474cfb

Added to database: 11/12/2025, 4:55:20 PM

Last enriched: 2/27/2026, 2:59:38 PM

Last updated: 3/24/2026, 5:37:57 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses