SB2025062109 - Multiple vulnerabilities in sslh
Published: June 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Use of out-of-range pointer offset (CVE-ID: CVE-2025-46806)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory handling in is_openvpn_protocol() function in probe.c. A remote attacker can send specially crafted UDP packets to the affected server and perform a denial of service (DoS) attack.
2) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-46807)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a file descriptor exhaustion in sslh-select.c and sslh-ev.c. A remote attacker can send specially crafted UDP packets to the server and perform a denial of service (DoS) attack.
3) Input validation error (CVE-ID: N/A)
The vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to insufficient validation of undefined syslog data. A local user with ability to generate syslog events can potentially crash the application.
Remediation
Install update from vendor's website.
References
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46806
- https://github.com/yrutschle/sslh/releases/tag/v2.2.4
- https://github.com/yrutschle/sslh/commit/204305a88fb32cffaf1349253a2b052186ca8d39
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46807
- https://github.com/yrutschle/sslh/commit/ff8206f7c8a47f901b78a1b78db5a4c788f6aa6f