Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-12872

Опубликовано: 15 мая 2020
Источник: debian

Описание

yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks, if running on an Erlang/OTP virtual machine with a version less than 21.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
erlangfixed1:21.2.6+dfsg-1package
erlangfixed1:19.2.1+dfsg-2+deb9u3stretchpackage
erlangno-dsajessiepackage

Примечания

  • https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70

  • https://github.com/erlyaws/yaws/issues/402

  • In Debian yaws uses the cipher settings from erlang, mark the version which

  • landed in Buster as fixed (although it was possibly fixed earlier between

  • Stretch and Buster. The CVE was assigned specifically for yaws, cf. #961422

  • for discussion.

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 5 лет назад

yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks, if running on an Erlang/OTP virtual machine with a version less than 21.0.

CVSS3: 5.5
nvd
больше 5 лет назад

yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks, if running on an Erlang/OTP virtual machine with a version less than 21.0.

CVSS3: 5.5
github
больше 3 лет назад

yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks.