
CVE-2023-48795 – ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
https://notcve.org/view.php?id=CVE-2023-48795
18 Dec 2023 — The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phas... • https://packetstorm.news/files/id/176280 • CWE-222: Truncation of Security-relevant Information CWE-354: Improper Validation of Integrity Check Value •

CVE-2022-37026 – erlang/otp: Client Authentication Bypass
https://notcve.org/view.php?id=CVE-2022-37026
21 Sep 2022 — In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS. En Erlang/OTP versiones anteriores a 23.3.4.15, 24.x anteriores a 24.3.4.2 y 25.x anteriores a 25.0.2, se presenta una Omisión de Autenticación de Cliente en determinadas situaciones de certificación de cliente para SSL, TLS y DTLS A Client Authentication Bypass was found in Erlang/OTP. This issue occurs in certain client-cer... • https://erlangforums.com/c/erlang-news-announcements/91 • CWE-305: Authentication Bypass by Primary Weakness •

CVE-2021-29221
https://notcve.org/view.php?id=CVE-2021-29221
09 Apr 2021 — A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions. Se detectó una vulnerabilidad de escalada de privilegios local en Erlang/OTP anterior a v... • https://deepsurface.com/deepsurface-security-advisory-local-privilege-escalation-in-erlang-on-windows-cve-2021-29221 • CWE-426: Untrusted Search Path •

CVE-2020-35733
https://notcve.org/view.php?id=CVE-2020-35733
15 Jan 2021 — An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority. Se detectó un problema en Erlang/OTP versiones anteriores a 23.2.2. La aplicación ssl versión 10.2, acepta y confía en una cadena de certificados X.509 no válida para una Autoridad de Certificación root confiable • https://erlang.org/pipermail/erlang-questions/2021-January/100357.html • CWE-295: Improper Certificate Validation •

CVE-2020-25623
https://notcve.org/view.php?id=CVE-2020-25623
02 Oct 2020 — Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used. Erlang/OTP versiones 22.3.x anteriores a 22.3.4.6 y versiones 23.x anteriores a 23.1, permite un salto de directorio. Un atacante puede enviar una petición HTTP diseñada para leer archivos arbitrarios, si es usado httpd en la aplicación inets • https://github.com/erlang/otp/releases/tag/OTP-23.1 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2016-1000107
https://notcve.org/view.php?id=CVE-2016-1000107
10 Dec 2019 — inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. inets en Erlang posiblemente versión 22.1 y anteriores, siguen RFC sección 3875 versión 4.1.18 y, por lo tanto, no protegen l... • http://www.openwall.com/lists/oss-security/2016/07/18/6 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2017-1000385 – erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack
https://notcve.org/view.php?id=CVE-2017-1000385
09 Dec 2017 — The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack). El servidor TLS en Erlang/OTP responde con alertas TLS diferentes a los diferentes tipos de error en el relleno RSA PKCS #1 1.5. Esto permite que un atacante descifre contenido o firme mensajes con la clave privada del servidor (esta es una variación de... • http://erlang.org/pipermail/erlang-questions/2017-November/094255.html • CWE-203: Observable Discrepancy CWE-300: Channel Accessible by Non-Endpoint •

CVE-2016-10253 – Ubuntu Security Notice USN-3571-1
https://notcve.org/view.php?id=CVE-2016-10253
18 Mar 2017 — An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to. Se ha descubierto un problema en Erlang/OTP 18.x. • https://github.com/erlang/otp/pull/1108 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-2774 – Ubuntu Security Notice USN-3571-1
https://notcve.org/view.php?id=CVE-2015-2774
07 Apr 2016 — Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). Erlang/OTP en versiones anteriores a 18.0-rc1 no comprueba correctamente los bytes de relleno CBC cuando finaliza las conexiones, lo que hace más fácil para atacantes man-in-the-middle obtener datos en texto plano a través de un ataque padding-oracle, una variante... • http://lists.opensuse.org/opensuse-updates/2016-02/msg00124.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2014-1693 – Ubuntu Security Notice USN-3571-1
https://notcve.org/view.php?id=CVE-2014-1693
08 Dec 2014 — Multiple CRLF injection vulnerabilities in the FTP module in Erlang/OTP R15B03 allow context-dependent attackers to inject arbitrary FTP commands via CRLF sequences in the (1) user, (2) account, (3) cd, (4) ls, (5) nlist, (6) rename, (7) delete, (8) mkdir, (9) rmdir, (10) recv, (11) recv_bin, (12) recv_chunk_start, (13) send, (14) send_bin, (15) send_chunk_start, (16) append_chunk_start, (17) append, or (18) append_bin command. Múltiples vulnerabilidades de inyección CRLF en el módulo FTP en Erlang/OTP R15B... • http://advisories.mageia.org/MGASA-2014-0553.html •