The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification
References
Link | Resource |
---|---|
http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html | Third Party Advisory |
http://www.securityfocus.com/bid/104162 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040904 | Third Party Advisory VDB Entry |
https://efail.de | Exploit Mitigation Third Party Advisory |
https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html | Third Party Advisory |
https://news.ycombinator.com/item?id=17066419 | Issue Tracking Third Party Advisory |
https://protonmail.com/blog/pgp-vulnerability-efail | Issue Tracking Third Party Advisory |
https://twitter.com/matthew_d_green/status/995996706457243648 | Third Party Advisory |
https://www.patreon.com/posts/cybersecurity-15-18814817 | Issue Tracking Third Party Advisory |
https://www.synology.com/support/security/Synology_SA_18_22 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-05-16 19:29
Updated : 2024-05-17 01:16
NVD link : CVE-2017-17688
Mitre link : CVE-2017-17688
CVE.ORG link : CVE-2017-17688
JSON object : View
Products Affected
freron
- mailmate
postbox-inc
- postbox
bloop
- airmail
horde
- horde_imp
roundcube
- webmail
mozilla
- thunderbird
flipdogsolutions
- maildroid
r2mail2
- r2mail2
microsoft
- outlook
apple
emclient
- emclient
CWE