Executive Summary

Summary
Title Erlang vulnerabilities
Informations
Name USN-3571-1 First vendor Publication 2018-02-14
Vendor Ubuntu Last vendor Modification 2018-02-14
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Erlang.

Software Description: - erlang: Concurrent, real-time, distributed functional language

Details:

It was discovered that the Erlang FTP module incorrectly handled certain CRLF sequences. A remote attacker could possibly use this issue to inject arbitrary FTP commands. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-1693)

It was discovered that Erlang incorrectly checked CBC padding bytes. A remote attacker could possibly use this issue to perform a padding oracle attack and decrypt traffic. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-2774)

It was discovered that Erlang incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause Erlang to crash, resulting in a denial of service, or execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-10253)

Hanno Böck, Juraj Somorovsky and Craig Young discovered that the Erlang otp TLS server incorrectly handled error reporting. A remote attacker could possibly use this issue to perform a variation of the Bleichenbacher attack and decrypt traffic or sign messages. (CVE-2017-1000385)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.10:
erlang 1:20.0.4+dfsg-1ubuntu1.1

Ubuntu 16.04 LTS:
erlang 1:18.3-dfsg-1ubuntu3.1

Ubuntu 14.04 LTS:
erlang 1:16.b.3-dfsg-1ubuntu2.2

After a standard system update you need to reboot your computer to make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3571-1
CVE-2014-1693, CVE-2015-2774, CVE-2016-10253, CVE-2017-1000385

Package Information:
https://launchpad.net/ubuntu/+source/erlang/1:20.0.4+dfsg-1ubuntu1.1
https://launchpad.net/ubuntu/+source/erlang/1:18.3-dfsg-1ubuntu3.1
https://launchpad.net/ubuntu/+source/erlang/1:16.b.3-dfsg-1ubuntu2.2

Original Source

Url : http://www.ubuntu.com/usn/USN-3571-1

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-203 Information Exposure Through Discrepancy
33 % CWE-200 Information Exposure
33 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 70
Os 2
Os 1
Os 1

Snort® IPS/IDS

Date Description
2018-04-05 limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt
RuleID : 45830 - Revision : 1 - Type : SERVER-OTHER
2018-01-17 limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt
RuleID : 45201 - Revision : 2 - Type : SERVER-OTHER
2018-01-17 limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt
RuleID : 45200 - Revision : 2 - Type : SERVER-OTHER
2018-01-17 limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt
RuleID : 45199 - Revision : 2 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2018-01-15 Name : The remote Fedora host is missing a security update.
File : fedora_2017-9e6df1e099.nasl - Type : ACT_GATHER_INFO
2017-12-18 Name : The remote Debian host is missing a security update.
File : debian_DLA-1207.nasl - Type : ACT_GATHER_INFO
2017-12-14 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-1358.nasl - Type : ACT_GATHER_INFO
2017-12-13 Name : The remote Fedora host is missing a security update.
File : fedora_2017-93b6236635.nasl - Type : ACT_GATHER_INFO
2017-12-08 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4057.nasl - Type : ACT_GATHER_INFO
2017-07-17 Name : The remote Fedora host is missing a security update.
File : fedora_2017-cbed8f4169.nasl - Type : ACT_GATHER_INFO
2017-04-03 Name : The remote Fedora host is missing a security update.
File : fedora_2017-42ebcac2b5.nasl - Type : ACT_GATHER_INFO
2017-03-31 Name : The remote Fedora host is missing a security update.
File : fedora_2017-e2480c7f50.nasl - Type : ACT_GATHER_INFO
2016-07-14 Name : The remote Fedora host is missing a security update.
File : fedora_2015-33583e5029.nasl - Type : ACT_GATHER_INFO
2016-02-24 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-245.nasl - Type : ACT_GATHER_INFO
2015-08-18 Name : The remote Fedora host is missing a security update.
File : fedora_2015-12923.nasl - Type : ACT_GATHER_INFO
2015-08-18 Name : The remote Fedora host is missing a security update.
File : fedora_2015-12970.nasl - Type : ACT_GATHER_INFO
2015-04-01 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-174.nasl - Type : ACT_GATHER_INFO
2014-12-26 Name : The remote Fedora host is missing a security update.
File : fedora_2014-17009.nasl - Type : ACT_GATHER_INFO
2014-12-15 Name : The remote Fedora host is missing a security update.
File : fedora_2014-16214.nasl - Type : ACT_GATHER_INFO
2014-12-02 Name : The remote Fedora host is missing a security update.
File : fedora_2014-15394.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2018-02-14 17:19:27
  • First insertion