![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2015-2774 |
Description: | Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the- middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). |
Test IDs: | 1.3.6.1.4.1.25623.1.1.10.2015.0192 1.3.6.1.4.1.25623.1.0.869883 1.3.6.1.4.1.25623.1.0.869891 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-2774 BugTraq ID: 73398 http://www.securityfocus.com/bid/73398 https://www.imperialviolet.org/2014/12/08/poodleagain.html http://openwall.com/lists/oss-security/2015/03/27/6 http://openwall.com/lists/oss-security/2015/03/27/9 SuSE Security Announcement: openSUSE-SU-2016:0523 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-02/msg00124.html https://usn.ubuntu.com/3571-1/ |