Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-17688


The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification


Published

2018-05-16T19:29:00.223

Last Modified

2024-11-21T03:18:27.723

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apple mail - Yes
Application apple mail - Yes
Application bloop airmail - Yes
Application emclient emclient - Yes
Application flipdogsolutions maildroid - Yes
Application freron mailmate - Yes
Application horde horde_imp - Yes
Application microsoft outlook 2007 Yes
Application mozilla thunderbird - Yes
Application postbox-inc postbox - Yes
Application r2mail2 r2mail2 - Yes
Application roundcube webmail - Yes

References