Lucene search

K
ubuntuUbuntuUSN-6059-1
HistoryMay 08, 2023 - 12:00 a.m.

Erlang vulnerability

2023-05-0800:00:00
ubuntu.com
35
erlang
tls
client authentication
ubuntu
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.9%

Releases

  • Ubuntu 22.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • erlang - Concurrent, real-time, distributed functional language

Details

It was discovered that Erlang did not properly implement TLS client
certificate validation during the TLS handshake. A remote attacker could
use this issue to bypass client authentication.

OSVersionArchitecturePackageVersionFilename
Ubuntu22.10noarcherlang-ssl< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-asn1< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-asn1-dbgsym< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-base< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-base-dbgsym< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-common-test< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-common-test-dbgsym< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-crypto< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Ubuntu22.10noarcherlang-crypto-dbgsym< 1:24.3.4.1+dfsg-1ubuntu0.1UNKNOWN
Rows per page:
1-10 of 1581

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.9%