Podatność CVE-2017-17688


Publikacja: 2018-05-16

Opis:
** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification.

Typ:

CWE-noinfo

Producent: Microsoft
Produkt: Outlook 
Wersje: 2007;
Producent: Horde
Produkt: Horde imp 
Producent: Apple
Produkt: MAIL 
Producent: Mozilla
Produkt: Thunderbird 
Producent: Emclient
Produkt: Emclient 
Producent: R2mail2
Produkt: R2mail2 
Producent: Freron
Produkt: Mailmate 
Producent: Bloop
Produkt: Airmail 
Producent: Postbox-inc
Produkt: Postbox 
Producent: Flipdogsolutions
Produkt: Maildroid 
Producent: Roundcube
Produkt: Webmail 

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
4.3/10
2.9/10
8.6/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Zdalny
Średnia
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Częściowy
Brak
Brak

 Referencje:
http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html
http://www.securityfocus.com/bid/104162
http://www.securitytracker.com/id/1040904
https://efail.de
https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html
https://news.ycombinator.com/item?id=17066419
https://protonmail.com/blog/pgp-vulnerability-efail
https://twitter.com/matthew_d_green/status/995996706457243648
https://www.patreon.com/posts/cybersecurity-15-18814817
https://www.synology.com/support/security/Synology_SA_18_22

Podobne CVE
CVE-2019-15237
Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.
CVE-2019-10740
In Roundcube Webmail 1.3.4, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified...
CVE-2018-9846
In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to pe...
CVE-2018-1000072
iRedMail version prior to commit f04b8ef contains a Insecure Permissions vulnerability in Roundcube Webmail that can result in Exfiltrate a user's password protected secret GPG key file and other important configuration files.. This attack appear to ...
CVE-2018-1000071
roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.
CVE-2017-16651
Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to...
CVE-2017-1000049
Roundcube Webmail 1.1.5 is vulnerable to Persistent Xss
CVE-2015-5383
Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to obtain sensitive information by reading files in the (1) config, (2) temp, or (3) logs directory.

Copyright 2019, cxsecurity.com

 

Back to Top