[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2017-17688Date: (C)2018-05-18   (M)2024-04-19


The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.9CVSS Score : 4.3
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
SECTRACK-1040904
BID-104162
http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html
https://efail.de
https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html
https://news.ycombinator.com/item?id=17066419
https://protonmail.com/blog/pgp-vulnerability-efail
https://twitter.com/matthew_d_green/status/995996706457243648
https://www.patreon.com/posts/cybersecurity-15-18814817
https://www.synology.com/support/security/Synology_SA_18_22

OVAL    4
oval:org.secpod.oval:def:114547
oval:org.secpod.oval:def:114564
oval:org.secpod.oval:def:114566
oval:org.secpod.oval:def:2101792
...

© SecPod Technologies