{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-59088","title":"Title"},{"category":"description","text":"If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where\nthe \"use_dns\" setting is explicitly set to false are not affected.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-59088","url":"https://www.suse.com/security/cve/CVE-2025-59088"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"Advisory link for RHSA-2025:21138","url":"https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002259.html"}],"title":"SUSE CVE CVE-2025-59088","tracking":{"current_release_date":"2025-12-19T00:27:43Z","generator":{"date":"2025-11-26T00:24:14Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-59088","initial_release_date":"2025-11-26T00:24:14Z","revision_history":[{"date":"2025-11-26T00:24:14Z","number":"2","summary":"Current version"},{"date":"2025-11-27T00:23:32Z","number":"3","summary":"Current version"},{"date":"2025-12-17T00:27:54Z","number":"4","summary":"description changed"},{"date":"2025-12-19T00:27:43Z","number":"5","summary":"description changed"}],"status":"interim","version":"5"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Liberty Linux 9","product":{"name":"SUSE Liberty Linux 9","product_id":"SUSE Liberty Linux 9","product_identification_helper":{"cpe":"cpe:/o:suse:sll:9"}}},{"category":"product_version","name":"python3-kdcproxy-1.0.0-9.el9_6","product":{"name":"python3-kdcproxy-1.0.0-9.el9_6","product_id":"python3-kdcproxy-1.0.0-9.el9_6","product_identification_helper":{"purl":"pkg:rpm/suse/python3-kdcproxy@1.0.0-9.el9_6"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"python3-kdcproxy-1.0.0-9.el9_6 as component of SUSE Liberty Linux 9","product_id":"SUSE Liberty Linux 9:python3-kdcproxy-1.0.0-9.el9_6"},"product_reference":"python3-kdcproxy-1.0.0-9.el9_6","relates_to_product_reference":"SUSE Liberty Linux 9"}]},"vulnerabilities":[{"cve":"CVE-2025-59088","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-59088"}],"notes":[{"category":"general","text":"If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where\nthe \"use_dns\" setting is explicitly set to false are not affected.","title":"CVE description"}],"product_status":{"recommended":["SUSE Liberty Linux 9:python3-kdcproxy-1.0.0-9.el9_6"]},"references":[{"category":"external","summary":"CVE-2025-59088","url":"https://www.suse.com/security/cve/CVE-2025-59088"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"Advisory link for RHSA-2025:21138","url":"https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002259.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 9:python3-kdcproxy-1.0.0-9.el9_6"]}],"threats":[{"category":"impact","date":"2025-11-12T15:00:06Z","details":"important"}],"title":"CVE-2025-59088"}]}