The connection limiter is implemented incorrectly.
It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix socket) for the services letmeind
and letmeinfwd
.
Therefore, the command line option num-connections
is not effective and does not limit the number of simultaneously incoming connections.
letmeind
is the public network facing daemon (TCP/UDP).
letmeinfwd
is the internal firewall daemon that only listens on local Unix socket.
Possible Denial Of Service by resource exhaustion.
All versions <= 10.2.0
are affected.
All users shall upgrade to version 10.2.1
.
Untested possible workarounds:
- It might be possible to limit the number of active connections to the letmeind
port (default 5800) via firewall.
- The resource consumption of the service might be restricted with a service manager such as systemd.
If a (D)DoS is run against the service, something is going to be affected. The connection limiter assures that the effect on the system itself is limited at the expense of the effect on the letmein services itself. So even with the connection limiter active, a (D)DoS can lead to a less responsive or unresponsive letmein service.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-770" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-06-23T21:24:59Z" }