Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

CVE-2020-12872 #402

Closed
carnil opened this issue May 24, 2020 · 2 comments
Closed

CVE-2020-12872 #402

carnil opened this issue May 24, 2020 · 2 comments

Comments

@carnil
Copy link

carnil commented May 24, 2020

While going trough some CVE feeds and track the information noticed the CVE-2020-12872 assignment for yaws, which is from the following report

Were you informed about this?

@vinoski
Copy link
Collaborator

vinoski commented May 24, 2020

I have not been informed of this until now, thanks for letting me know.

In this particular area, Yaws by default supports whatever Erlang/OTP underneath it supports, which in turn is affected by the OpenSSL version the Erlang/OTP VM was built to use. OpenSSL took steps years ago to mitigate this issue, so if users are using a recent OpenSSL version in their deployment, they're probably in pretty good shape. In addition, Yaws allows users to specify, via configuration, the TLS versions and cipher suites they use for a particular server.

The author of the blog post is using Yaws version 2.0.2, which is five years old, but they don't specify what versions of Erlang/OTP or OpenSSL they're using. The posting says Yaws versions up to 2.0.6 are also vulnerable, but that depends, again, on the underlying Erlang/OTP and OpenSSL versions. We generally don't patch old versions; instead, given that we try hard to maintain backward compatibility, we encourage folks to upgrade to newer versions. I'm currently doing some work on Yaws in the cipher suite area due to changes that came along in the recent Erlang/OTP 23.0 release, and will consider additional work to address this CVE.

@sgolovan
Copy link
Contributor

I confirm that Yaws by default uses the list of TLS ciphers supplied by the Erlang ssl module. As far as I can find, Erlang/OTP up to version 20 included 3DES ciphers into the default list, and starting from version 21 (released 2 years ago) it doesn't include 3DES ciphers into its default list of ciphers.

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants