Categories: Cyber Security News

GNOME RDP Vulnerability Let Attackers Exhaust System Resources & Crash Process

A severe security vulnerability affecting GNOME Remote Desktop has been discovered, allowing unauthenticated attackers to exhaust system resources and crash critical processes. 

CVE-2025-5024, disclosed on May 21, 2025, poses significant risks to organizations utilizing remote desktop services across Red Hat Enterprise Linux environments.

The vulnerability, assigned a CVSS score of 7.4, indicating high severity, targets the gnome-remote-desktop service when configured to listen for Remote Desktop Protocol (RDP) connections. 

Security researchers have identified this flaw as an Uncontrolled Resource Consumption vulnerability classified under CWE-400, enabling attackers to exploit the system without requiring authentication credentials.

GNOME Remote Desktop Vulnerability (CVE-2025-5024)

The vulnerability stems from how Gnome-Remote-Desktop handles incoming RDP Protocol Data Units (PDUs) when establishing connections. 

According to Red Hat‘s security advisory, malformed RDP PDUs can trigger excessive resource consumption, leading to service crashes and potential system instability. 

The attack vector utilizes network-based exploitation with low complexity, requiring no special privileges from the attacker.

The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H indicates that while the attack requires user interaction, it can be executed remotely with changed scope, resulting in high availability impact. 

Security experts note that repeated exploitation attempts may cause persistent resource leaks, preventing the gnome-remote-desktop service from opening files even after systemd restarts the process.

Risk Factors Details
Affected Products – Red Hat Enterprise Linux: Versions 8, 9, 10 (gnome-remote-desktop package) – Debian: Bullseye (11), Bookworm (12), Trixie (13), Sid (unstable) – Ubuntu: 25.04, 24.10, 24.04 LTS, 22.04 LTS, 20.04 LTS (under evaluation)
Impact Persistent denial-of-service via resource exhaustion
Exploit Prerequisites Requires victim to initiate RDP connectionMalformed RDP Protocol Data Units (PDUs) must reach service
CVSS 3.1 Score 7.4 (High)

Affected Systems

Red Hat Enterprise Linux versions 8, 9, and 10 are confirmed vulnerable to CVE-2025-5024, with the gnome-remote-desktop package specifically affected across all these distributions. 

The vulnerability also impacts Debian systems running versions 11, 12, and 13 of the gnome-remote-desktop package. 

Security analysts have assigned an EPSS (Exploit Prediction Scoring System) score of 0.04%, indicating approximately 9th percentile risk for exploitation within 30 days.

The denial-of-service nature of this vulnerability can severely disrupt remote desktop operations, particularly in enterprise environments where gnome-remote-desktop facilitates critical remote access workflows. 

Sponsored

Unlike traditional service crashes, the resource leak component means that affected systems may require manual intervention beyond simple service restarts to restore full functionality.

Security administrators can implement immediate protective measures by disabling the gnome-remote-desktop service using systemctl commands: sudo systemctl stop gnome-remote-desktop.service and sudo systemctl disable gnome-remote-desktop.service. 

This temporary workaround prevents the service from listening for RDP connections, effectively mitigating exploitation attempts until patches become available.

Organizations should prioritize firewall configurations to block port 3389, the standard RDP port, particularly for internet-facing systems. 

Network segmentation and access control policies can further limit exposure by restricting RDP access to authorized network segments. 

System administrators are advised to monitor for unusual resource consumption patterns and implement automated service health checks to detect potential exploitation attempts.

Red Hat has acknowledged the vulnerability through bugzilla report 2367717, focusing on “Uncontrolled Resource Consumption due to Malformed RDP PDUs”. 

Organizations utilizing affected systems should prepare for security updates and consider implementing alternative remote desktop solutions for critical operations until comprehensive patches are deployed across their infrastructure.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

The post GNOME RDP Vulnerability Let Attackers Exhaust System Resources & Crash Process appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Abilene community honors Black lives lost in heartfelt tribute

ABILENE, Texas (KTAB/KRBC) - As Black History Month comes to a close, the Abilene community…

1 hour ago

Bison Bash kicks off Abilene Flying Bison’s new season

ABILENE, Texas (KTAB/KRBC) - For the third year in a row, Abilene Flying Bison fans…

1 hour ago

MY TAKE: The Pentagon punished Anthropic for red lines it accepted from OpenAI hours later

KINGSTON, Wash. — On Friday afternoon, President Trump ordered every federal agency to stop using…

2 hours ago

(Song) A Day In The Life At NamePros

Today: Buying Market or Marketplace domains in .com – Budget: Up to $1,000 / Looking…

3 hours ago

Pluralistic: California can stop Larry Ellison from buying Warners (28 Feb 2026)

Today's links California can stop Larry Ellison from buying Warners: These are the right states'…

3 hours ago

This Week’s Awesome Tech Stories From Around the Web (Through February 28)

Computing Breaking Encryption With a Quantum Computer Just Got 10 Times EasierKarmela Padavic-Callaghan | New…

3 hours ago

This website uses cookies.