{"id":"CVE-2017-1000385","details":"The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).","modified":"2026-04-16T06:17:21.943732231Z","published":"2017-12-12T21:29:00.213Z","related":["SUSE-SU-2018:0974-1","openSUSE-SU-2017:3255-1","openSUSE-SU-2017:3257-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00010.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3571-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0528"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0303"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102197"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0242"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0368"},{"type":"REPORT","url":"https://robotattack.org/"},{"type":"REPORT","url":"https://www.debian.org/security/2017/dsa-4057"},{"type":"REPORT","url":"http://erlang.org/pipermail/erlang-questions/2017-November/094255.html"},{"type":"REPORT","url":"http://erlang.org/pipermail/erlang-questions/2017-November/094256.html"},{"type":"REPORT","url":"https://www.kb.cert.org/vuls/id/144389"},{"type":"REPORT","url":"http://erlang.org/pipermail/erlang-questions/2017-November/094257.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/erlang/otp","events":[{"introduced":"0"},{"last_affected":"8c54c2199c503e7eac931b4e1765f5307726dcc8"},{"introduced":"0"},{"last_affected":"e64a1f429ec5f7534e0201fed42967aeb1aae8d8"},{"introduced":"0"},{"last_affected":"2302ea8ca97b8a9075e9234d15430c47d3a115c8"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"18.3.4.7"},{"introduced":"0"},{"last_affected":"19.3.6.4"},{"introduced":"0"},{"last_affected":"20.1.7"}]}}],"versions":["OTP-17.0","OTP-18.0","OTP-18.0-rc1","OTP-18.1","OTP-18.2.1","OTP-18.3.1","OTP-18.3.2","OTP-18.3.3","OTP-18.3.4","OTP-18.3.4.1","OTP-18.3.4.2","OTP-18.3.4.3","OTP-18.3.4.4","OTP-18.3.4.5","OTP-18.3.4.6","OTP-18.3.4.7","OTP-19.0","OTP-19.0-rc1","OTP-19.0-rc2","OTP-19.1","OTP-19.2","OTP-19.3","OTP-19.3.1","OTP-19.3.2","OTP-19.3.3","OTP-19.3.4","OTP-19.3.5","OTP-19.3.6","OTP-19.3.6.1","OTP-19.3.6.2","OTP-19.3.6.3","OTP-19.3.6.4","OTP-20.0","OTP-20.0-rc1","OTP-20.0-rc2","OTP-20.1","OTP-20.1.1","OTP-20.1.2","OTP-20.1.3","OTP-20.1.4","OTP-20.1.5","OTP-20.1.6","OTP-20.1.7","OTP_17.0-rc1","OTP_17.0-rc2","OTP_R13B03","OTP_R13B04","OTP_R14A","OTP_R14B","OTP_R14B01","OTP_R14B02","OTP_R14B03","OTP_R15A","OTP_R15B","OTP_R16A_RELEASE_CANDIDATE","OTP_R16B"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-1000385.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}