SB2025102052 - Multiple vulnerabilities in otp



SB2025102052 - Multiple vulnerabilities in otp

Published: October 20, 2025 Updated: April 10, 2026

Security Bulletin ID SB2025102052
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2025-48041)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when handling the SSH_FXP_OPENDIR operation. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.


2) Uncontrolled recursion (CVE-ID: CVE-2025-48040)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


3) Resource exhaustion (CVE-ID: CVE-2025-48039)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote SFTP user can trigger resource exhaustion and perform a denial of service (DoS) attack.


4) Resource exhaustion (CVE-ID: CVE-2025-48038)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote SFTP user can trigger resource exhaustion and perform a denial of service (DoS) attack.


5) Open redirect (CVE-ID: CVE-2016-1000107)

The vulnerability allows a remote attacker to redirect an application's outbound HTTP traffic to an arbitrary proxy server.

The vulnerability exists due to environment variable pollution in mod_cgi when processing a crafted Proxy header in an HTTP request. A remote attacker can send a specially crafted request to redirect an application's outbound HTTP traffic to an arbitrary proxy server.

User interaction is required.


Remediation

Install update from vendor's website.