Erlang.OTP.SSH.Server.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in the Erlang/OPT libraries.
The vulnerability is due to an incorrect handling of requests. A remote, unauthenticated attacker can exploit this vulnerability by sending maliciously crafted requests to the vulnerable server. Successful exploitation could result in arbitrary code execution in the security context of the server.
Affected Products
Erlang/OTP 27.x prior to 27.3.3
Erlang/OTP 26.x prior to 26.2.5.11
Erlang/OTP 25.x prior to 25.3.2.20
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |