Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-26618

Опубликовано: 20 фев. 2025
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed the max allowed packet size and potentially cause large amount of memory to be allocated. Note that situation described above can only happen for successfully authenticated users after completing the SSH handshake. This issue has been patched in OTP versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known workarounds for this vulnerability.

A flaw was found in the Erlang OTP library. When multiple SSH packets are received, they may be combined into a single SFTP packet that exceeds the maximum allowed size. This flaw allows an authenticated remote attacker to trigger excessive memory allocation and cause a denial of service.

Отчет

Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 16.2erlangNot affected
Red Hat OpenStack Platform 17.1erlangNot affected
Red Hat OpenStack Platform 18.0erlangNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-789
https://bugzilla.redhat.com/show_bug.cgi?id=2346900otp: erlang: SSH SFTP packet size not verified properly in Erlang OTP

EPSS

Процентиль: 25%
0.00082
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed the max allowed packet size and potentially cause large amount of memory to be allocated. Note that situation described above can only happen for successfully authenticated users after completing the SSH handshake. This issue has been patched in OTP versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known workarounds for this vulnerability.

nvd
4 месяца назад

Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed the max allowed packet size and potentially cause large amount of memory to be allocated. Note that situation described above can only happen for successfully authenticated users after completing the SSH handshake. This issue has been patched in OTP versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known workarounds for this vulnerability.

msrc
3 месяца назад

Описание отсутствует

debian
4 месяца назад

Erlang is a programming language and runtime system for building massi ...

suse-cvrf
3 месяца назад

Security update for erlang26

EPSS

Процентиль: 25%
0.00082
Низкий

6.5 Medium

CVSS3

Уязвимость CVE-2025-26618