ALT-PU-2021-3065-1
Closed vulnerabilities
Published: 2021-01-15
BDU:2023-01664
Уязвимость языка программирования Erlang, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю получить доступ к конфиденциальным данным
Severity: HIGH (7.5)
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
Published: 2019-12-10
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2016-1000107
inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
Severity: MEDIUM (6.1)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
References:
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- https://bugs.erlang.org/browse/ERL-198
- https://bugs.erlang.org/browse/ERL-198
- https://httpoxy.org/
- https://httpoxy.org/
- https://security-tracker.debian.org/tracker/CVE-2016-1000107
- https://security-tracker.debian.org/tracker/CVE-2016-1000107
Published: 2021-01-15
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-35733
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
- https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
- https://github.com/erlang/otp/releases
- https://github.com/erlang/otp/releases
- FEDORA-2021-06cbd73fba
- FEDORA-2021-06cbd73fba
- https://www.erlang.org/downloads
- https://www.erlang.org/downloads
- https://www.erlang.org/news
- https://www.erlang.org/news