The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
Project Subscriptions
| Vendors | Products |
|---|---|
|
9folders
Subscribe
|
Nine
Subscribe
|
|
Apple
Subscribe
|
Mail
Subscribe
|
|
Bloop
Subscribe
|
Airmail
Subscribe
|
|
Emclient
Subscribe
|
Emclient
Subscribe
|
|
Flipdogsolutions
Subscribe
|
Maildroid
Subscribe
|
|
Freron
Subscribe
|
Mailmate
Subscribe
|
|
Gnome
Subscribe
|
Evolution
Subscribe
|
|
Google
Subscribe
|
Gmail
Subscribe
|
|
Horde
Subscribe
|
Horde Imp
Subscribe
|
|
Ibm
Subscribe
|
Notes
Subscribe
|
|
Kde
Subscribe
|
|
|
Microsoft
Subscribe
|
Outlook
Subscribe
|
|
Mozilla
Subscribe
|
Thunderbird
Subscribe
|
|
Postbox-inc
Subscribe
|
Postbox
Subscribe
|
|
R2mail2
Subscribe
|
R2mail2
Subscribe
|
|
Ritlabs
Subscribe
|
The Bat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4244-1 | thunderbird security update |
EUVD |
EUVD-2017-8846 | The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. |
Ubuntu USN |
USN-7729-1 | KDE PIM vulnerabilities |
Ubuntu USN |
USN-7730-1 | PIM Messagelib vulnerabilities |
Ubuntu USN |
USN-7731-1 | KMail vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:59:17.441Z
Reserved: 2017-12-15T00:00:00
Link: CVE-2017-17689
No data.
Status : Modified
Published: 2018-05-16T19:29:00.303
Modified: 2024-11-21T03:18:27.893
Link: CVE-2017-17689
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN