SB2025102052 - Multiple vulnerabilities in otp
Published: October 20, 2025 Updated: April 10, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2025-48041)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when handling the SSH_FXP_OPENDIR operation. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Uncontrolled recursion (CVE-ID: CVE-2025-48040)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled recursion. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
3) Resource exhaustion (CVE-ID: CVE-2025-48039)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote SFTP user can trigger resource exhaustion and perform a denial of service (DoS) attack.
4) Resource exhaustion (CVE-ID: CVE-2025-48038)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote SFTP user can trigger resource exhaustion and perform a denial of service (DoS) attack.
5) Open redirect (CVE-ID: CVE-2016-1000107)
The vulnerability allows a remote attacker to redirect an application's outbound HTTP traffic to an arbitrary proxy server.
The vulnerability exists due to environment variable pollution in mod_cgi when processing a crafted Proxy header in an HTTP request. A remote attacker can send a specially crafted request to redirect an application's outbound HTTP traffic to an arbitrary proxy server.
User interaction is required.
Remediation
Install update from vendor's website.
References
- https://github.com/erlang/otp/security/advisories/GHSA-79c4-cvv7-4qm3
- https://github.com/erlang/otp/security/advisories/GHSA-h7rg-6rjg-4cph
- https://github.com/erlang/otp/security/advisories/GHSA-rr5p-6856-j7h8
- https://github.com/erlang/otp/security/advisories/GHSA-pvj7-9652-7h9r
- https://github.com/erlang/otp/security/advisories/GHSA-wrj5-4mmp-gvr8
- https://github.com/advisories/GHSA-wrj5-4mmp-gvr8