CVE Vulnerabilities

CVE-2025-5024

Uncontrolled Resource Consumption

Published: May 22, 2025 | Modified: Aug 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.4 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Enterprise Linux 10RedHatgnome-remote-desktop-0:47.3-2.el10_0*
Red Hat Enterprise Linux 8RedHatgnome-remote-desktop-0:0.1.8-4.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatgnome-remote-desktop-0:0.1.6-9.el8_2.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatgnome-remote-desktop-0:0.1.8-4.el8_4*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatgnome-remote-desktop-0:0.1.8-4.el8_4*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatgnome-remote-desktop-0:0.1.8-4.el8_6*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatgnome-remote-desktop-0:0.1.8-4.el8_6*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatgnome-remote-desktop-0:0.1.8-4.el8_6*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatgnome-remote-desktop-0:0.1.8-4.el8_8*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatgnome-remote-desktop-0:0.1.8-4.el8_8*
Red Hat Enterprise Linux 9RedHatgnome-remote-desktop-0:40.0-11.el9_6*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatgnome-remote-desktop-0:40.0-10.el9_0*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatgnome-remote-desktop-0:40.0-10.el9_2*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatgnome-remote-desktop-0:40.0-11.el9_4*
Gnome-remote-desktopUbuntufocal*
Gnome-remote-desktopUbuntuoracular*
Gnome-remote-desktopUbuntuplucky*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References