The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apple
Subscribe
|
Mail
Subscribe
|
|
Bloop
Subscribe
|
Airmail
Subscribe
|
|
Emclient
Subscribe
|
Emclient
Subscribe
|
|
Flipdogsolutions
Subscribe
|
Maildroid
Subscribe
|
|
Freron
Subscribe
|
Mailmate
Subscribe
|
|
Horde
Subscribe
|
Horde Imp
Subscribe
|
|
Microsoft
Subscribe
|
Outlook
Subscribe
|
|
Mozilla
Subscribe
|
Thunderbird
Subscribe
|
|
Postbox-inc
Subscribe
|
Postbox
Subscribe
|
|
R2mail2
Subscribe
|
R2mail2
Subscribe
|
|
Roundcube
Subscribe
|
Webmail
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:59:17.546Z
Reserved: 2017-12-15T00:00:00
Link: CVE-2017-17688
No data.
Status : Modified
Published: 2018-05-16T19:29:00.223
Modified: 2024-11-21T03:18:27.723
Link: CVE-2017-17688
OpenCVE Enrichment
No data.
Weaknesses