Vulnerability Details : CVE-2017-1000385
Public exploit exists!
The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).
Products affected by CVE-2017-1000385
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:erlang:erlang\/otp:19.3.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:erlang:erlang\/otp:18.3.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:erlang:erlang\/otp:20.1.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-1000385
83.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2017-1000385
-
Scanner for Bleichenbacher Oracle in RSA PKCS #1 v1.5
Disclosure Date: 2009-06-17First seen: 2020-04-26auxiliary/scanner/ssl/bleichenbacher_oracleSome TLS implementations handle errors processing RSA key exchanges and encryption (PKCS #1 v1.5 messages) in a broken way that leads an adaptive chosen-chiphertext attack. Attackers cannot recover a server's private key, but they can decrypt and sign messages with i
CVSS scores for CVE-2017-1000385
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2017-1000385
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-1000385
-
https://lists.debian.org/debian-lts-announce/2017/12/msg00010.html
[SECURITY] [DLA 1207-1] erlang security update
-
https://www.debian.org/security/2017/dsa-4057
Debian -- Security Information -- DSA-4057-1 erlangIssue Tracking;Third Party Advisory
-
http://www.securityfocus.com/bid/102197
Erlang/OTP CVE-2017-1000385 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
http://erlang.org/pipermail/erlang-questions/2017-November/094255.html
[erlang-questions] Patch Package: OTP 20.1.7Issue Tracking;Mailing List;Vendor Advisory
-
https://www.kb.cert.org/vuls/id/144389
VU#144389 - TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 paddingIssue Tracking;Third Party Advisory;US Government Resource
-
https://access.redhat.com/errata/RHSA-2018:0242
RHSA-2018:0242 - Security Advisory - Red Hat Customer Portal
-
https://robotattack.org/
The ROBOT Attack - Return of Bleichenbacher's Oracle ThreatIssue Tracking;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:0528
RHSA-2018:0528 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2018:0303
RHSA-2018:0303 - Security Advisory - Red Hat Customer Portal
-
http://erlang.org/pipermail/erlang-questions/2017-November/094256.html
[erlang-questions] Patch Package: OTP 19.3.6.4Issue Tracking;Mailing List;Vendor Advisory
-
https://usn.ubuntu.com/3571-1/
USN-3571-1: Erlang vulnerabilities | Ubuntu security notices
-
http://erlang.org/pipermail/erlang-questions/2017-November/094257.html
[erlang-questions] Patch Package: OTP 18.3.4.7Issue Tracking;Mailing List;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0368
RHSA-2018:0368 - Security Advisory - Red Hat Customer Portal
Jump to