Vulnerability description

Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure.

This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.

Affected

Erlang / OTP  » ssh_sftp

Module Source File
ssh_sftp lib/ssh/src/ssh_sftpd.erl
Status Version Changes / Fixed in
affected pkg:otp/ssh@3.0.1
  • unaffected at pkg:otp/ssh@5.3.3
  • unaffected at pkg:otp/ssh@5.2.11.3
  • unaffected at pkg:otp/ssh@5.1.4.12
affected 17.0
  • unaffected at 28.0.3
  • unaffected at 27.3.4.3
  • unaffected at 26.2.5.15
affected 07b8f441ca711f9812fad9e9115bab3c3aa92f79
  • unaffected at c242e6458967e9514bea351814151695807a54ac
  • unaffected at 043ee3c943e2977c1acdd740ad13992fd60b6bf0

Workarounds

  • Disable sftp
  • limiting number of max_sessions allowed for sshd, so exploiting becomes more complicated

References

Credits

  • Remediation developer: Jakub Witczak
  • Remediation reviewer: Ingela Andin

CVE record as JSON:  GET /cves/cve-2025-48039.json