Debian Erlang vulnerabilities

32 known vulnerabilities affecting debian/erlang.

Total CVEs
32
CISA KEV
1
actively exploited
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH7MEDIUM10LOW12

Vulnerabilities

Page 2 of 2
CVE-2020-35733HIGHCVSS 7.5fixed in erlang 1:23.2.2+dfsg-1 (bookworm)2020
CVE-2020-35733 [HIGH] CVE-2020-35733: erlang - An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 ac... An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority. Scope: local bookworm: resolved (fixed in 1:23.2.2+dfsg-1) bullseye: resolved (fixed in 1:23.2.2+dfsg-1) forky: resolved (fixed in 1:23.2.2+dfsg-1) sid: resolved (fixed in 1:23.2.2+dfsg-1) trixi
debian
CVE-2020-25623HIGHCVSS 7.5fixed in erlang 1:23.1+dfsg-1 (bookworm)2020
CVE-2020-25623 [HIGH] CVE-2020-25623: erlang - Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversa... Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used. Scope: local bookworm: resolved (fixed in 1:23.1+dfsg-1) bullseye: resolved (fixed in 1:23.1+dfsg-1) forky: resolved (fixed in 1:23.1+dfsg-1) sid: resolved (fixed in 1:23.1+d
debian
CVE-2020-12872LOWCVSS 5.5fixed in erlang 1:21.2.6+dfsg-1 (bookworm)2020
CVE-2020-12872 [MEDIUM] CVE-2020-12872: erlang - yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, a... yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks, if running on an Erlang/OTP virtual machine with a version less than 21.0. Scope: local bookworm: resolved (fixed in 1:21.2.6+dfsg-1) bullseye: resolved (fixed in 1:21.2.6+dfsg-1) forky: resolved (fixed in 1:21.2.6+dfsg-1) sid: resolved
debian
CVE-2017-1000385MEDIUMCVSS 5.9fixed in erlang 1:20.1.7+dfsg-1 (bookworm)2017
CVE-2017-1000385 [MEDIUM] CVE-2017-1000385: erlang - The Erlang otp TLS server answers with different TLS alerts to different error t... The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack). Scope: local bookworm: resolved (fixed in 1:20.1.7+dfsg-1) bullseye: resolved (fixed in 1:20.1.7+dfsg-1)
debian
CVE-2016-10253CRITICALCVSS 9.8fixed in erlang 1:19.2.1+dfsg-2 (bookworm)2016
CVE-2016-10253 [CRITICAL] CVE-2016-10253: erlang - An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regu... An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to. Scope: local bookworm:
debian
CVE-2016-1000107LOWCVSS 6.1fixed in erlang 1:27.3.4.3+dfsg-1 (forky)2016
CVE-2016-1000107 [MEDIUM] CVE-2016-1000107: erlang - inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and th... inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request,
debian
CVE-2015-2774LOWCVSS 3.4fixed in erlang 1:17.3-dfsg-4 (bookworm)2015
CVE-2015-2774 [LOW] CVE-2015-2774: erlang - Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when termin... Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). Scope: local bookworm: resolved (fixed in 1:17.3-dfsg-4) bullseye: resolved (fixed in 1:17.3-dfsg-4) forky: resolved (fixed
debian
CVE-2014-3566LOWCVSS 3.4PoCfixed in erlang 1:17.3-dfsg-3 (bookworm)2014
CVE-2014-3566 [LOW] CVE-2014-3566: bouncycastle - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses... The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2014-1693LOWCVSS 7.5fixed in erlang 1:16.b.3.1-dfsg-3 (bookworm)2014
CVE-2014-1693 [HIGH] CVE-2014-1693: erlang - Multiple CRLF injection vulnerabilities in the FTP module in Erlang/OTP R15B03 a... Multiple CRLF injection vulnerabilities in the FTP module in Erlang/OTP R15B03 allow context-dependent attackers to inject arbitrary FTP commands via CRLF sequences in the (1) user, (2) account, (3) cd, (4) ls, (5) nlist, (6) rename, (7) delete, (8) mkdir, (9) rmdir, (10) recv, (11) recv_bin, (12) recv_chunk_start, (13) send, (14) send_bin, (15) send_chunk_start, (16)
debian
CVE-2011-3389MEDIUMCVSS 4.3PoCfixed in asterisk 1:13.7.2~dfsg-1 (bullseye)2011
CVE-2011-3389 [MEDIUM] CVE-2011-3389: asterisk - The SSL protocol, as used in certain configurations in Microsoft Windows and Mic... The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS s
debian
CVE-2011-0766LOWCVSS 7.8fixed in erlang 1:14.b.3-dfsg-1 (bookworm)2011
CVE-2011-0766 [HIGH] CVE-2011-0766: erlang - The random number generator in the Crypto application before 2.0.2.2, and SSH be... The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys. Scope: local bookworm: resolved (fixed in 1:14.b.3-dfsg-1) bullseye: resolved (fixed in 1:14.
debian
CVE-2009-0130LOWCVSS 5.82009
CVE-2009-0130 [MEDIUM] CVE-2009-0130: erlang - lib/crypto/c_src/crypto_drv.c in erlang does not properly check the return value... lib/crypto/c_src/crypto_drv.c in erlang does not properly check the return value from the OpenSSL DSA_do_verify function, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: a package maintainer disputes this issue, reporting that there is a proper check wi
debian