CVE-2015-2774

Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
Configurations

Configuration 1 (hide)

cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Feb 2023, 19:09

Type Values Removed Values Added
CPE cpe:2.3:a:erlang:otp:*:*:*:*:*:*:*:* cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
First Time Erlang erlang\/otp

Information

Published : 2016-04-07 21:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-2774

Mitre link : CVE-2015-2774

CVE.ORG link : CVE-2015-2774


JSON object : View

Products Affected

oracle

  • solaris

opensuse

  • opensuse

erlang

  • erlang\/otp
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor