CVE-2017-1000385
erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).
El servidor TLS en Erlang/OTP responde con alertas TLS diferentes a los diferentes tipos de error en el relleno RSA PKCS #1 1.5. Esto permite que un atacante descifre contenido o firme mensajes con la clave privada del servidor (esta es una variación del ataque Bleichenbacher).
An erlang TLS server configured with cipher suites using RSA key exchange, may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA. This may result in plain-text recovery of encrypted messages and/or a man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server’s private key itself.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-29 CVE Reserved
- 2017-12-09 CVE Published
- 2023-07-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-203: Observable Discrepancy
- CWE-300: Channel Accessible by Non-Endpoint
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/102197 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2017/12/msg00010.html | Mailing List | |
https://robotattack.org | Issue Tracking | |
https://www.kb.cert.org/vuls/id/144389 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Erlang Search vendor "Erlang" | Erlang\/otp Search vendor "Erlang" for product "Erlang\/otp" | 18.3.4.7 Search vendor "Erlang" for product "Erlang\/otp" and version "18.3.4.7" | - |
Affected
| ||||||
Erlang Search vendor "Erlang" | Erlang\/otp Search vendor "Erlang" for product "Erlang\/otp" | 19.3.6.4 Search vendor "Erlang" for product "Erlang\/otp" and version "19.3.6.4" | - |
Affected
| ||||||
Erlang Search vendor "Erlang" | Erlang\/otp Search vendor "Erlang" for product "Erlang\/otp" | 20.1.7 Search vendor "Erlang" for product "Erlang\/otp" and version "20.1.7" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|