First published: Wed May 16 2018(Updated: )
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
9folders Nine | ||
Apple Mail | ||
Apple Mail | ||
Bloop Airmail | ||
Emclient Emclient | ||
Flipdogsolutions Maildroid | ||
Freron Mailmate | ||
GNOME Evolution | ||
Google Gmail | ||
Horde Horde Imp | ||
IBM Notes | ||
KDE KMail | ||
KDE Trojita | ||
Microsoft Outlook | =2007 | |
Microsoft Outlook | =2010 | |
Microsoft Outlook | =2013 | |
Microsoft Outlook | =2016 | |
Mozilla Thunderbird | ||
Postbox-inc Postbox | ||
R2mail2 R2mail2 | ||
RITLabs The Bat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17689 is a vulnerability in the S/MIME specification that allows a Cipher Block Chaining (CBC) malleability-gadget attack leading to plaintext exfiltration, also known as EFAIL.
CVE-2017-17689 affects multiple software including 9folders Nine, Apple Mail, Bloop Airmail, Emclient Emclient, Flipdogsolutions Maildroid, Freron Mailmate, GNOME Evolution, Google Gmail, Horde Horde Imp, IBM Notes, KDE KMail, KDE Trojita, Microsoft Outlook (versions 2007, 2010, 2013, and 2016), Mozilla Thunderbird, Postbox-inc Postbox, R2mail2 R2mail2, and RITLabs The Bat.
CVE-2017-17689 has a severity rating of medium and a CVSS score of 5.9.
To mitigate CVE-2017-17689, it is recommended to update the affected software to the latest version, where the vulnerability has been patched.
You can find more information about CVE-2017-17689 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/104165), [EFAIL](https://efail.de), [Hacker News](https://news.ycombinator.com/item?id=17066419)