First published: Wed May 16 2018(Updated: )
** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mail | ||
Apple Mail | ||
Bloop Airmail | ||
Emclient Emclient | ||
Flipdogsolutions Maildroid | ||
Freron Mailmate | ||
Horde Horde Imp | ||
Microsoft Outlook | =2007 | |
Mozilla Thunderbird | ||
Postbox-inc Postbox | ||
R2mail2 R2mail2 | ||
Roundcube Webmail | ||
=2007 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17688 is a vulnerability in the OpenPGP specification that allows a Cipher Feedback Mode (CFB) malleability-gadget attack leading to plaintext exfiltration.
The severity of CVE-2017-17688 is medium, with a severity value of 5.9.
The following software is affected by CVE-2017-17688: Apple Mail, Bloop Airmail, Emclient Emclient, Flipdogsolutions Maildroid, Freron Mailmate, Horde Horde Imp, Microsoft Outlook (2007 version), Mozilla Thunderbird, Postbox-inc Postbox, R2mail2 R2mail2, Roundcube Webmail.
CVE-2017-17688 allows a malleability-gadget attack that can indirectly lead to plaintext exfiltration by exploiting the Cipher Feedback Mode (CFB) in the OpenPGP specification.
Yes, you can find references for CVE-2017-17688 at the following links: http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html, http://www.securityfocus.com/bid/104162, http://www.securitytracker.com/id/1040904