Vulnerability CVE-2017-17688


Published: 2018-05-16

Description:
** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification.

Type:

CWE-noinfo

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Roundcube -> Webmail 
R2mail2 -> R2mail2 
Postbox-inc -> Postbox 
Mozilla -> Thunderbird 
Microsoft -> Outlook 
Horde -> Horde imp 
Freron -> Mailmate 
Flipdogsolutions -> Maildroid 
Emclient -> Emclient 
Bloop -> Airmail 
Apple -> MAIL 

 References:
http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html
http://www.securityfocus.com/bid/104162
http://www.securitytracker.com/id/1040904
https://efail.de
https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html
https://news.ycombinator.com/item?id=17066419
https://protonmail.com/blog/pgp-vulnerability-efail
https://twitter.com/matthew_d_green/status/995996706457243648
https://www.patreon.com/posts/cybersecurity-15-18814817
https://www.synology.com/support/security/Synology_SA_18_22

Copyright 2024, cxsecurity.com

 

Back to Top