Critical SSLH Vulnerabilities Allow Hackers to Launch Remote DoS Attacks

Two severe vulnerabilities (CVE-2025-46807 and CVE-2025-46806) in the protocol multiplexer SSLH allow remote attackers to crash services via resource exhaustion and memory misalignment issues.

Patched in version 2.2.4, these flaws affect systems using sslh-select or sslh-ev I/O models, particularly those handling UDP traffic.

Below, we break down the technical details, risks, and mitigation strategies.

File Descriptor Exhaustion Triggers Segmentation Fault

(CVE-2025-46807)

The sslh-select and sslh-ev Implementations fail to handle UDP session timeouts properly, allowing attackers to exhaust the default 1,024 file descriptors.

When the limit is reached, a NULL pointer dereference in the new_cnx A variable triggers a segmentation fault, crashing the service.

Attack Mechanics:

  • UDP sessions remain open indefinitely without traffic, enabling resource starvation.
  • Sending 29+ bytes of 0x08 to OpenVPN-probed UDP ports reproduces the crash.
  • Compounding this, the udp_max_connections setting also triggers the bug.

Fix: Commit ff8206f7c In v2.2.4 resolves the segmentation fault but leaves UDP sockets lingering until timeout.

2. Misaligned Memory Access in OpenVPN Probe

(CVE-2025-46806)

The is_openvpn_protocol() function dereferences unaligned uint32_t pointers in UDP payloads, causing SIGBUS errors on strict-alignment architectures like ARM. On x86_64, this results in undefined behavior detectable via -fsanitize=alignment.

Vulnerable Code Snippet:

cif (ntohl(*(uint32_t*)(p + OVPN_HARD_RESET_PACKET_ID_OFFSET(OVPN_HMAC_128))) <= 5u)  

This directly accesses a 4-byte integer at offset 25 in the network buffer, ignoring alignment requirements.

Fix: Upstream replaced pointer dereferencing with memcpy() to stack variables in commit 204305a88fb3.


3. Mitigation and Risk Analysis

FactorCVE-2025-46807CVE-2025-46806
CVSS Score8.7 (High)6.9 (Medium)
ImpactRemote DoS via crashArchitecture-dependent DoS
Attack VectorNetwork (UDP)Network (UDP)
ComplexityLow (no authentication required)Low (single malformed packet)
Privileges RequiredNoneNone

Recommendations:

  • Upgrade to sslh v2.2.4 immediately.
  • For UDP-heavy deployments, enforce system-wide file descriptor limits via cgroups or ulimi.
  • Monitor for false positives in protocol detection, as probes like is_tinc_protocol() rely on minimal heuristics.

While SSLH’s default hardening and privilege separation limit broader exploitation, these vulnerabilities underscore risks in protocol multiplexers processing untrusted data.

Administrators should prioritize patching and consider OS-level resource constraints to mitigate advanced DoS attacks.

The SUSE team confirms SSLH remains viable for production use post-patch, though vigilance against edge-case probe failures is advised

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here