ID

VAR-201805-0227


CVE

CVE-2017-17688


TITLE

OpenPGP and S/MIME mail client vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#122919

DESCRIPTION

The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification. In multiple mail clients OpenPGP and S/MIME A plaintext message may be leaked when decrypting the message. OpenPGP and S/MIME For e-mail clients that support, it is possible to establish a channel for sending plaintext by decrypting encrypted e-mail inserted with content crafted by an attacker with the user's e-mail client. The discoverer can attack with this vulnerability "CBC/CFB gadget attack" I call it. For example HTML image By inserting a tag, the decrypted message is HTTP It may be sent as part of the request. * *CVE-2017-17688: OpenPGP CFB Attacks * *CVE-2017-17689: S/MIME CBC Attacks Some email clients also use multipart MIME Because the message is not properly separated and processed, attackers can process encrypted mail in plain text. MIME It can be included in the part. in this case, CBC/CFB gadget attack The plaintext message may be sent without executing. Detail is, <a href="https://efail.de/efail-attack-paper.pdf" target="blank"> Articles provided by the discoverer </a> Please refer to.A remote attacker may obtain plaintext from encrypted mail without the key information required for decryption. OpenPGP is prone to an information disclosure vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks and obtain sensitive information. Successful exploits will lead to other attacks. OpenPGP is a set of email encryption standards that supports multiple platforms

Trust: 2.79

sources: NVD: CVE-2017-17688 // CERT/CC: VU#122919 // JVNDB: JVNDB-2017-012995 // BID: 104162 // VULHUB: VHN-108735 // VULMON: CVE-2017-17688

AFFECTED PRODUCTS

vendor:roundcubemodel:webmailscope:eqversion: -

Trust: 1.6

vendor:bloopmodel:airmailscope:eqversion: -

Trust: 1.0

vendor:freronmodel:mailmatescope:eqversion: -

Trust: 1.0

vendor:hordemodel:impscope:eqversion: -

Trust: 1.0

vendor:flipdogsolutionsmodel:maildroidscope:eqversion: -

Trust: 1.0

vendor:r2mail2model:r2mail2scope:eqversion: -

Trust: 1.0

vendor:emclientmodel:emclientscope:eqversion: -

Trust: 1.0

vendor:applemodel:mailscope:eqversion: -

Trust: 1.0

vendor:mozillamodel:thunderbirdscope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:outlookscope:eqversion:2007

Trust: 1.0

vendor:postboxmodel:postboxscope:eqversion: -

Trust: 1.0

vendor:9foldersmodel: - scope: - version: -

Trust: 0.8

vendor:airmailmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:evolutionmodel: - scope: - version: -

Trust: 0.8

vendor:flipdogmodel: - scope: - version: -

Trust: 0.8

vendor:gpgtoolsmodel: - scope: - version: -

Trust: 0.8

vendor:gnupgmodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:kmailmodel: - scope: - version: -

Trust: 0.8

vendor:mailmatemodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:postboxmodel: - scope: - version: -

Trust: 0.8

vendor:r2mail2model: - scope: - version: -

Trust: 0.8

vendor:ritlabs srlmodel: - scope: - version: -

Trust: 0.8

vendor:roundcubemodel: - scope: - version: -

Trust: 0.8

vendor:the enigmailmodel: - scope: - version: -

Trust: 0.8

vendor:the hordemodel: - scope: - version: -

Trust: 0.8

vendor:trojitamodel: - scope: - version: -

Trust: 0.8

vendor:em clientmodel: - scope: - version: -

Trust: 0.8

vendor:multiple vendorsmodel: - scope: - version: -

Trust: 0.8

vendor:roundcubemodel:round cube webmailscope:eqversion:0

Trust: 0.3

vendor:r2mail2model:r2mail2scope:eqversion:0

Trust: 0.3

vendor:postboxmodel:postboxscope:eqversion:0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:52.5.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:45.5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:45.1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:15.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:13.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:12.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.20

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.024

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.19

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.15

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.12

Trust: 0.3

vendor:mozillamodel:thunderbird betascope:eqversion:1.52

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.13

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:9.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:9.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:8.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:52.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:52.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:52.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:52.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:52.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:52

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:45.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:45.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:45.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:45.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:38.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:32.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:31

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.19

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.17

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.15

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.8.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:24.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:23.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.23

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.22

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.21

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.20

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.18

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:17.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:16

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:15.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:15

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:14.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:13.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:12.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:11.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:11.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.8

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.14

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.12

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:thunderbird betascope:eqversion:1.0.5

Trust: 0.3

vendor:microsoftmodel:outlookscope:eqversion:20070

Trust: 0.3

vendor:hordemodel:project horde impscope:eqversion:0

Trust: 0.3

vendor:flipdogmodel:solutions maildroidscope:eqversion:0

Trust: 0.3

vendor:enigmailmodel:enigmailscope:eqversion:0

Trust: 0.3

vendor:emmodel:client em clientscope:eqversion:0

Trust: 0.3

vendor:applemodel:mailscope: - version: -

Trust: 0.3

vendor:airmailmodel:airmailscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#122919 // BID: 104162 // JVNDB: JVNDB-2017-012995 // CNNVD: CNNVD-201712-725 // NVD: CVE-2017-17688

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-17688
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-201712-725
value: MEDIUM

Trust: 0.6

VULHUB: VHN-108735
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-17688
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-17688
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-108735
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-17688
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-108735 // VULMON: CVE-2017-17688 // CNNVD: CNNVD-201712-725 // NVD: CVE-2017-17688

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-310

Trust: 0.1

sources: VULHUB: VHN-108735 // NVD: CVE-2017-17688

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-725

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201712-725

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-012995

PATCH

title:Debian CVElist Bug Report Logs: enigmail: efail attack against enigmailurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=56a8018aac811c8d81b81ef5a6c3623a

Trust: 0.1

title:Red Hat: CVE-2017-17688url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2017-17688

Trust: 0.1

title:Efail-malleability-gadget-exploiturl:https://github.com/jaads/Efail-malleability-gadget-exploit

Trust: 0.1

title:more Boring bugsurl:https://github.com/hannob/pgpbugs

Trust: 0.1

title:SecDB - Security Feedsurl:https://github.com/giterlizzi/secdb-feeds

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2018/05/14/smime_pgp_encryption_flaw_emails_vulnerable_to_snooping/

Trust: 0.1

sources: VULMON: CVE-2017-17688

EXTERNAL IDS

db:NVDid:CVE-2017-17688

Trust: 2.9

db:BIDid:104162

Trust: 2.1

db:CERT/CCid:VU#122919

Trust: 2.0

db:SECTRACKid:1040904

Trust: 1.8

db:JVNid:JVNVU95575473

Trust: 0.8

db:JVNDBid:JVNDB-2017-012995

Trust: 0.8

db:CNNVDid:CNNVD-201712-725

Trust: 0.7

db:VULHUBid:VHN-108735

Trust: 0.1

db:VULMONid:CVE-2017-17688

Trust: 0.1

sources: CERT/CC: VU#122919 // VULHUB: VHN-108735 // VULMON: CVE-2017-17688 // BID: 104162 // JVNDB: JVNDB-2017-012995 // CNNVD: CNNVD-201712-725 // NVD: CVE-2017-17688

REFERENCES

url:https://efail.de/

Trust: 1.9

url:http://www.securityfocus.com/bid/104162

Trust: 1.8

url:https://www.synology.com/support/security/synology_sa_18_22

Trust: 1.8

url:http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html

Trust: 1.8

url:https://efail.de

Trust: 1.8

url:https://lists.gnupg.org/pipermail/gnupg-users/2018-may/060334.html

Trust: 1.8

url:https://news.ycombinator.com/item?id=17066419

Trust: 1.8

url:https://protonmail.com/blog/pgp-vulnerability-efail

Trust: 1.8

url:https://twitter.com/matthew_d_green/status/995996706457243648

Trust: 1.8

url:https://www.patreon.com/posts/cybersecurity-15-18814817

Trust: 1.8

url:http://www.securitytracker.com/id/1040904

Trust: 1.8

url:https://efail.de/efail-attack-paper.pdf

Trust: 1.6

url:https://www.kb.cert.org/vuls/id/122919

Trust: 1.2

url:https://tools.ietf.org/html/rfc4880

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17689

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17688

Trust: 0.8

url:https://jvn.jp/vu/jvnvu95575473/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-17689

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-17688

Trust: 0.8

url:https://www.openpgp.org/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1577906

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2017-17688

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898630

Trust: 0.1

url:https://github.com/jaads/efail-malleability-gadget-exploit

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CERT/CC: VU#122919 // VULHUB: VHN-108735 // VULMON: CVE-2017-17688 // BID: 104162 // JVNDB: JVNDB-2017-012995 // CNNVD: CNNVD-201712-725 // NVD: CVE-2017-17688

CREDITS

Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, and Jorg Schwenk.

Trust: 0.3

sources: BID: 104162

SOURCES

db:CERT/CCid:VU#122919
db:VULHUBid:VHN-108735
db:VULMONid:CVE-2017-17688
db:BIDid:104162
db:JVNDBid:JVNDB-2017-012995
db:CNNVDid:CNNVD-201712-725
db:NVDid:CVE-2017-17688

LAST UPDATE DATE

2024-11-23T20:04:06.356000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#122919date:2018-05-15T00:00:00
db:VULHUBid:VHN-108735date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-17688date:2023-11-07T00:00:00
db:BIDid:104162date:2018-05-15T10:00:00
db:JVNDBid:JVNDB-2017-012995date:2018-08-30T00:00:00
db:CNNVDid:CNNVD-201712-725date:2019-10-23T00:00:00
db:NVDid:CVE-2017-17688date:2024-11-21T03:18:27.723

SOURCES RELEASE DATE

db:CERT/CCid:VU#122919date:2018-05-14T00:00:00
db:VULHUBid:VHN-108735date:2018-05-16T00:00:00
db:VULMONid:CVE-2017-17688date:2018-05-16T00:00:00
db:BIDid:104162date:2018-05-14T00:00:00
db:JVNDBid:JVNDB-2017-012995date:2018-05-16T00:00:00
db:CNNVDid:CNNVD-201712-725date:2017-12-18T00:00:00
db:NVDid:CVE-2017-17688date:2018-05-16T19:29:00.223