CVE-2015-2774

Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
Configurations

Configuration 1 (hide)

cpe:2.3:a:erlang:otp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Information

Published : 2016-04-07 21:59

Updated : 2018-10-30 16:27


NVD link : CVE-2015-2774

Mitre link : CVE-2015-2774


JSON object : View

Products Affected

oracle

  • solaris

opensuse

  • opensuse

erlang

  • otp
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor