4.3
CVSSv2

CVE-2015-2774

Published: 07/04/2016 Updated: 21/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Erlang/OTP prior to 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle malicious users to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).

Vulnerable Product Search on Vulmon Subscribe to Product

erlang erlang\\/otp

oracle solaris 11.2

opensuse opensuse 13.2

Vendor Advisories

Debian Bug report logs - #781839 CVE-2015-2774 Package: src:erlang; Maintainer for src:erlang is Debian Erlang Packagers <pkg-erlang-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 3 Apr 2015 17:09:01 UTC Severity: grave Tags: security Fixed in version erlang/1:173-dfsg- ...
Several security issues were fixed in Erlang ...