DescriptionErlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
Overall state of this security issue: Ignore
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- openSUSE-SU-2016:0523-1, published Sat, 20 Feb 2016 13:12:42 +0100 (CET)
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Cloud 11.3||erlang||Ignore|
|SUSE Cloud 2.0||erlang||Ignore|
|SUSE Cloud 4||erlang||Ignore|
|SUSE Cloud 5||erlang||Ignore|