MEDIUM · 5.9

CVE-2017-17688

The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a proble...

Vulnerability Description

The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification

CVSS Score

5.9

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
AppleMail-
BloopAirmail-
EmclientEmclient-
FlipdogsolutionsMaildroid-
FreronMailmate-
HordeHorde Imp-
MicrosoftOutlook2007
MozillaThunderbird-
Postbox-IncPostbox-
R2Mail2R2Mail2-
RoundcubeWebmail-

References

FAQ

What is CVE-2017-17688?

CVE-2017-17688 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a proble...

How severe is CVE-2017-17688?

CVE-2017-17688 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-17688?

Check the references section above for vendor advisories and patch information. Affected products include: Apple Mail, Bloop Airmail, Emclient Emclient, Flipdogsolutions Maildroid, Freron Mailmate.