SB2025062109 - Multiple vulnerabilities in sslh



SB2025062109 - Multiple vulnerabilities in sslh

Published: June 21, 2025

Security Bulletin ID SB2025062109
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Use of out-of-range pointer offset (CVE-ID: CVE-2025-46806)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory handling in is_openvpn_protocol() function in probe.c. A remote attacker can send specially crafted UDP packets to the affected server and perform a denial of service (DoS) attack.


2) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-46807)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a file descriptor exhaustion in sslh-select.c and sslh-ev.c. A remote attacker can send specially crafted UDP packets to the server and perform a denial of service (DoS) attack.


3) Input validation error (CVE-ID: N/A)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to insufficient validation of undefined syslog data. A local user with ability to generate syslog events can potentially crash the application. 


Remediation

Install update from vendor's website.