Vulnerability description

Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding.

This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.

Affected

Erlang / OTP  » ssh_sftp

Module Source File
ssh_sftp lib/ssh/src/ssh_sftpd.erl
Status Version Changes / Fixed in
affected pkg:otp/ssh@3.0.1
  • unaffected at pkg:otp/ssh@5.3.3
  • unaffected at pkg:otp/ssh@5.2.11.3
  • unaffected at pkg:otp/ssh@5.1.4.12
affected 17.0
  • unaffected at 28.0.3
  • unaffected at 27.3.4.3
  • unaffected at 26.2.5.15
affected 07b8f441ca711f9812fad9e9115bab3c3aa92f79
  • unaffected at 5f9af63eec4657a37663828d206517828cb9f288
  • unaffected at d49efa2d4fa9e6f7ee658719cd76ffe7a33c2401

Workarounds

  • disabling SFTP
  • limiting number of max_sessions allowed for sshd, so exploiting becomes more complicated

References

Credits

  • Remediation developer: Jakub Witczak
  • Remediation reviewer: Ingela Andin

CVE record as JSON:  GET /cves/cve-2025-48041.json