// For flags

CVE-2017-17688

openSUSE Security Advisory - openSUSE-SU-2018:1393-1

Severity Score

5.9
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification

** EN DISPUTA ** La especificación OpenPGP permite un ataque malleability-gadget Cipher Feedback Mode (CFB) que puede conducir indirectamente a la exfiltración en texto plano. Esto también se conoce como EFAIL. NOTA: terceros indican que este es un problema en aplicaciones que gestionan de manera incorrecta la característica de Modification Detection Code (MDC) o que afectan un tipo de paquete obsoleto, en lugar de un problema en la especificación OpenPGP.

An update that fixes two vulnerabilities is now available. This update for enigmail to version 2.0.4 fixes multiple issues. CFB gadget attacks allowed to exfiltrate plaintext out of encrypted emails. Enigmail now fails on GnuPG integrity check warnings for old Algorithms CBC gadget attacks allows to exfiltrate plaintext out of encrypted emails This update also includes new and updated functionality. Enigmail will chose between S/MIME or OpenPGP depending on whether the keys for all recipients are available for the respective standard subject, following the Memory Hole standard for protected Email Headers intervals.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-12-15 CVE Reserved
  • 2018-05-16 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2025-05-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apple
Search vendor "Apple"
Mail
Search vendor "Apple" for product "Mail"
--
Affected
Apple
Search vendor "Apple"
Mail
Search vendor "Apple" for product "Mail"
-iphone_os
Affected
Bloop
Search vendor "Bloop"
Airmail
Search vendor "Bloop" for product "Airmail"
--
Affected
Emclient
Search vendor "Emclient"
Emclient
Search vendor "Emclient" for product "Emclient"
--
Affected
Flipdogsolutions
Search vendor "Flipdogsolutions"
Maildroid
Search vendor "Flipdogsolutions" for product "Maildroid"
--
Affected
Freron
Search vendor "Freron"
Mailmate
Search vendor "Freron" for product "Mailmate"
--
Affected
Horde
Search vendor "Horde"
Horde Imp
Search vendor "Horde" for product "Horde Imp"
--
Affected
Microsoft
Search vendor "Microsoft"
Outlook
Search vendor "Microsoft" for product "Outlook"
2007
Search vendor "Microsoft" for product "Outlook" and version "2007"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
--
Affected
Postbox-inc
Search vendor "Postbox-inc"
Postbox
Search vendor "Postbox-inc" for product "Postbox"
--
Affected
R2mail2
Search vendor "R2mail2"
R2mail2
Search vendor "R2mail2" for product "R2mail2"
--
Affected
Roundcube
Search vendor "Roundcube"
Webmail
Search vendor "Roundcube" for product "Webmail"
--
Affected