CVE Vulnerabilities

CVE-2025-5024

Uncontrolled Resource Consumption

Published: May 22, 2025 | Modified: Aug 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.4 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
Ubuntu
MEDIUM

A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 10 RedHat gnome-remote-desktop-0:47.3-2.el10_0 *
Red Hat Enterprise Linux 8 RedHat gnome-remote-desktop-0:0.1.8-4.el8_10 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat gnome-remote-desktop-0:0.1.6-9.el8_2.1 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat gnome-remote-desktop-0:0.1.8-4.el8_4 *
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On RedHat gnome-remote-desktop-0:0.1.8-4.el8_4 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat gnome-remote-desktop-0:0.1.8-4.el8_6 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat gnome-remote-desktop-0:0.1.8-4.el8_6 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat gnome-remote-desktop-0:0.1.8-4.el8_6 *
Red Hat Enterprise Linux 8.8 Telecommunications Update Service RedHat gnome-remote-desktop-0:0.1.8-4.el8_8 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat gnome-remote-desktop-0:0.1.8-4.el8_8 *
Red Hat Enterprise Linux 9 RedHat gnome-remote-desktop-0:40.0-11.el9_6 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat gnome-remote-desktop-0:40.0-10.el9_0 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat gnome-remote-desktop-0:40.0-10.el9_2 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat gnome-remote-desktop-0:40.0-11.el9_4 *
Gnome-remote-desktop Ubuntu focal *
Gnome-remote-desktop Ubuntu oracular *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References