Name | CVE-2017-1000385 |
Description | The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1207-1, DSA-4057-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
erlang (PTS) | bullseye | 1:23.2.6+dfsg-1+deb11u1 | fixed |
| bookworm | 1:25.2.3+dfsg-1 | fixed |
| trixie | 1:25.3.2.12+dfsg-3 | fixed |
| sid | 1:27.1.2+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://groups.google.com/forum/#!topic/erlang-programming/J0LH-j6fRlM
https://github.com/erlang/otp/commit/38b07caa2a1c6cd3537eadd36770afa54f067562 (OTP-20.1.7)
https://github.com/erlang/otp/commit/3b4386dd19b7e669f557c95ace8d7ba228291927 (OTP-19.3.6.4)
https://github.com/erlang/otp/commit/de3b9cdb8521d7edd524b4e17d1e3f883f832ec0 (OTP-18.3.4.7)
https://robotattack.org/