First published: Mon Dec 04 2017(Updated: )
An erlang TLS server configured with cipher suites using rsa key exchange, may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server’s private key itself. References: <a href="https://groups.google.com/forum/#!topic/erlang-programming/J0LH-j6fRlM">https://groups.google.com/forum/#!topic/erlang-programming/J0LH-j6fRlM</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/erlang | <20.1.7 | 20.1.7 |
debian/erlang | 1:23.2.6+dfsg-1+deb11u1 1:25.2.3+dfsg-1 1:25.3.2.12+dfsg-3 | |
Erlang/OTP | =18.3.4.7 | |
Erlang/OTP | =19.3.6.4 | |
Erlang/OTP | =20.1.7 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000385 is considered a high-severity vulnerability due to the potential for plaintext recovery and Man-in-the-middle attacks.
To fix CVE-2017-1000385, upgrade your Erlang installation to a version greater than 20.1.7 or to specific Debian packages like 1:23.2.6+dfsg-1+deb11u1.
CVE-2017-1000385 affects Erlang versions 18.3.4.7, 19.3.6.4, and 20.1.7, as well as Debian systems running vulnerable Erlang packages.
CVE-2017-1000385 potentially allows for an Adaptive Chosen Ciphertext attack which can lead to plaintext message recovery.
CVE-2017-1000385 is a remote vulnerability as it can be exploited over network connections targeting the configured TLS server.