CVE-2017-17688
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/05/2018
Last modified:
05/08/2024
Description
The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apple:mail:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:mail:-:*:*:*:*:iphone_os:*:* | ||
| cpe:2.3:a:bloop:airmail:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:emclient:emclient:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:flipdogsolutions:maildroid:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:freron:mailmate:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:horde:horde_imp:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:outlook:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:postbox-inc:postbox:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:r2mail2:r2mail2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:roundcube:webmail:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html
- http://www.securityfocus.com/bid/104162
- http://www.securitytracker.com/id/1040904
- https://efail.de
- https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html
- https://news.ycombinator.com/item?id=17066419
- https://protonmail.com/blog/pgp-vulnerability-efail
- https://twitter.com/matthew_d_green/status/995996706457243648
- https://www.patreon.com/posts/cybersecurity-15-18814817
- https://www.synology.com/support/security/Synology_SA_18_22



