Impact
Code handling SSH_FXP_OPENDIR operation does not allocate OS level file handle, but does create a file handle in Erlang VM.
Since OS file handle is not created, OS level limitations will not be applied. As a result the list of file handles might grow until resource consumption of Erlang VM affects the system stability.
This is a server side vulnerability.
Workarounds
- disabling SFTP
- limiting number of max_sessions allowed for sshd, so exploiting becomes more complicated
Affected/Unaffected Versions
A version larger than or equal to one of the listed patched versions is unaffected; otherwise, a version that satisfies an expression listed under affected versions is affected, and if it does not, it is unaffected.
The documentation of the new OTP version scheme describes how versions should be compared. Note that versions used prior to OTP 17.0, when the new OTP version scheme was introduced, are never listed since it is not well defined how to compare those versions.
In the case of this vulnerability, versions prior to OTP 17.0 are likely also affected.
Impact
Code handling SSH_FXP_OPENDIR operation does not allocate OS level file handle, but does create a file handle in Erlang VM.
Since OS file handle is not created, OS level limitations will not be applied. As a result the list of file handles might grow until resource consumption of Erlang VM affects the system stability.
This is a server side vulnerability.
Workarounds
Affected/Unaffected Versions
A version larger than or equal to one of the listed patched versions is unaffected; otherwise, a version that satisfies an expression listed under affected versions is affected, and if it does not, it is unaffected.
The documentation of the new OTP version scheme describes how versions should be compared. Note that versions used prior to OTP 17.0, when the new OTP version scheme was introduced, are never listed since it is not well defined how to compare those versions.
In the case of this vulnerability, versions prior to OTP 17.0 are likely also affected.