CVE-2017-17688

medium

Description

The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification

References

https://www.synology.com/support/security/Synology_SA_18_22

https://www.patreon.com/posts/cybersecurity-15-18814817

https://twitter.com/matthew_d_green/status/995996706457243648

https://protonmail.com/blog/pgp-vulnerability-efail

https://news.ycombinator.com/item?id=17066419

https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html

http://www.securitytracker.com/id/1040904

http://www.securityfocus.com/bid/104162

http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html

Details

Source: Mitre, NVD

Published: 2018-05-16

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: Medium